summary refs log tree commit diff
path: root/nixos/tests/maddy/tls.nix
blob: 44da4cf2a3cf2fb2892e5e59d2bb25bdc46c963f (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
import ../make-test-python.nix ({ pkgs, ... }:
let
  certs = import ../common/acme/server/snakeoil-certs.nix;
  domain = certs.domain;
in {
  name = "maddy-tls";
  meta = with pkgs.lib.maintainers; { maintainers = [ onny ]; };

  nodes = {
    server = { options, ... }: {
      services.maddy = {
        enable = true;
        hostname = domain;
        primaryDomain = domain;
        openFirewall = true;
        ensureAccounts = [ "postmaster@${domain}" ];
        ensureCredentials = {
          # Do not use this in production. This will make passwords world-readable
          # in the Nix store
          "postmaster@${domain}".passwordFile = "${pkgs.writeText "postmaster" "test"}";
        };
        tls = {
          loader = "file";
          certificates = [{
            certPath = "${certs.${domain}.cert}";
            keyPath = "${certs.${domain}.key}";
          }];
        };
        # Enable TLS listeners. Configuring this via the module is not yet
        # implemented.
        config = builtins.replaceStrings [
          "imap tcp://0.0.0.0:143"
          "submission tcp://0.0.0.0:587"
        ] [
          "imap tls://0.0.0.0:993 tcp://0.0.0.0:143"
          "submission tls://0.0.0.0:465 tcp://0.0.0.0:587"
        ] options.services.maddy.config.default;
      };
      # Not covered by openFirewall yet
      networking.firewall.allowedTCPPorts = [ 993 465 ];
    };

    client = { nodes, ... }: {
      security.pki.certificateFiles = [
        certs.ca.cert
      ];
      networking.extraHosts = ''
        ${nodes.server.networking.primaryIPAddress} ${domain}
     '';
      environment.systemPackages = [
        (pkgs.writers.writePython3Bin "send-testmail" { } ''
          import smtplib
          import ssl
          from email.mime.text import MIMEText

          context = ssl.create_default_context()
          msg = MIMEText("Hello World")
          msg['Subject'] = 'Test'
          msg['From'] = "postmaster@${domain}"
          msg['To'] = "postmaster@${domain}"
          with smtplib.SMTP_SSL(host='${domain}', port=465, context=context) as smtp:
              smtp.login('postmaster@${domain}', 'test')
              smtp.sendmail(
                'postmaster@${domain}', 'postmaster@${domain}', msg.as_string()
              )
        '')
        (pkgs.writers.writePython3Bin "test-imap" { } ''
          import imaplib

          with imaplib.IMAP4_SSL('${domain}') as imap:
              imap.login('postmaster@${domain}', 'test')
              imap.select()
              status, refs = imap.search(None, 'ALL')
              assert status == 'OK'
              assert len(refs) == 1
              status, msg = imap.fetch(refs[0], 'BODY[TEXT]')
              assert status == 'OK'
              assert msg[0][1].strip() == b"Hello World"
        '')
      ];
    };
  };

  testScript = ''
    start_all()
    server.wait_for_unit("maddy.service")
    server.wait_for_open_port(143)
    server.wait_for_open_port(993)
    server.wait_for_open_port(587)
    server.wait_for_open_port(465)
    client.succeed("send-testmail")
    client.succeed("test-imap")
  '';
})