mirror of
https://seed.flo-the.dev/z3gWc1qgaeZaoGwL4WTstLNoqjayM.git
synced 2025-12-06 04:47:35 +01:00
add more tests, refactor sign and encrypt
Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
This commit is contained in:
@@ -21,13 +21,36 @@ Tests for smtprd_ng
|
||||
# pylint: disable=protected-access
|
||||
|
||||
import configparser
|
||||
import email
|
||||
import email.message
|
||||
from pathlib import Path
|
||||
|
||||
from M2Crypto import BIO, SMIME, X509
|
||||
|
||||
from smtprd_ng import smtprd
|
||||
|
||||
|
||||
def config() -> smtprd.ClientConfig:
|
||||
"""Return method for settings used here in test"""
|
||||
cfg = smtprd.ClientConfig(
|
||||
hostname="localhost",
|
||||
port=1234,
|
||||
username="user",
|
||||
password="pass",
|
||||
use_tls=False,
|
||||
start_tls=False,
|
||||
sender="sender",
|
||||
recipients=["recipient"],
|
||||
set_reply_to="",
|
||||
smime_to_cert=Path("tests", "signer.pem"),
|
||||
smime_cert=Path("tests", "signer.pem"),
|
||||
smime_cert_private=Path("tests", "privkey.pem"),
|
||||
)
|
||||
return cfg
|
||||
|
||||
|
||||
def test_config_from_config():
|
||||
"""Test opening and readig the config file"""
|
||||
"""Test opening and reading the config file"""
|
||||
config_parser: configparser.ConfigParser = configparser.ConfigParser()
|
||||
with open(Path("config.example"), "r", encoding="utf8") as fp:
|
||||
config_parser.read_file(fp)
|
||||
@@ -35,12 +58,79 @@ def test_config_from_config():
|
||||
assert cfg.server.hostname == "localhost"
|
||||
assert cfg.client.port == 465
|
||||
assert cfg.client.smime_cert == ""
|
||||
assert cfg.client.use_tls is True
|
||||
|
||||
|
||||
def test_config_from_ini():
|
||||
"""Test parsing the config file and using fallbacks"""
|
||||
"""Test parsing the config file and using fallbacks.
|
||||
This is mostly redundant to the above test"""
|
||||
cfg = smtprd.Config.from_ini(Path("config.example"))
|
||||
assert cfg.server.hostname == "localhost"
|
||||
assert cfg.client.port == 465
|
||||
assert cfg.client.smime_cert == ""
|
||||
assert cfg.client.use_tls is True
|
||||
|
||||
|
||||
def test_client_encrypt():
|
||||
"""Test encryption. Keys were generated with
|
||||
openssl req -newkey rsa:1024 -nodes -x509 -days 365 -out signer.pem
|
||||
"""
|
||||
|
||||
client = smtprd.SMTPClient(config())
|
||||
encrypted = client._encrypt(b"abc", "subject")
|
||||
lines = encrypted.decode().splitlines()
|
||||
# Test format of header
|
||||
assert lines[0] == "From: " + str(config().sender)
|
||||
assert lines[1] == "To: " + str(config().recipients[0])
|
||||
assert lines[2] == "Subject: " + "subject"
|
||||
assert lines[3] == "MIME-Version: 1.0"
|
||||
assert lines[4] == 'Content-Disposition: attachment; filename="smime.p7m"'
|
||||
assert (
|
||||
lines[5]
|
||||
== 'Content-Type: application/x-pkcs7-mime; smime-type=enveloped-data; name="smime.p7m"'
|
||||
)
|
||||
assert lines[6] == "Content-Transfer-Encoding: base64"
|
||||
# new line is important to seperate header from body
|
||||
assert lines[7] == ""
|
||||
assert (
|
||||
lines[8] == "MIIBdgYJKoZIhvcNAQcDoIIBZzCCAWMCAQAxggEeMIIBGgIBADCBgjBqMQswCQYD"
|
||||
)
|
||||
|
||||
s = SMIME.SMIME()
|
||||
s.load_key(config().smime_cert_private, config().smime_cert)
|
||||
buf = BIO.MemoryBuffer(encrypted)
|
||||
p7, _ = SMIME.smime_load_pkcs7_bio(buf)
|
||||
out = s.decrypt(p7)
|
||||
assert b"abc" in out
|
||||
|
||||
|
||||
def test_client_sign():
|
||||
"""Test signing"""
|
||||
client = smtprd.SMTPClient(config())
|
||||
message = email.message.EmailMessage()
|
||||
message.set_content("Test to sign")
|
||||
# header are needed, because email.message.Emailmessage will add a
|
||||
# newline between the boundary and the content if no header is found
|
||||
message.add_header("From", config().sender)
|
||||
message.add_header("To", config().recipients[0])
|
||||
message.add_header("Subject", "Test")
|
||||
signed = client._sign(message)
|
||||
assert "This is an S/MIME signed message" in signed.decode()
|
||||
assert "Test to sign" in signed.decode()
|
||||
|
||||
s = SMIME.SMIME()
|
||||
# Load the signer's cert.
|
||||
x509 = X509.load_cert(Path(config().smime_cert))
|
||||
sk = X509.X509_Stack()
|
||||
sk.push(x509)
|
||||
s.set_x509_stack(sk)
|
||||
# Load the signer's CA cert. In this case, because the signer's
|
||||
# cert is self-signed, it is the signer's cert itself.
|
||||
st = X509.X509_Store()
|
||||
st.load_info(str(config().smime_cert))
|
||||
s.set_x509_store(st)
|
||||
# Load the data, verify it.
|
||||
buf = BIO.MemoryBuffer(signed)
|
||||
p7, data = SMIME.smime_load_pkcs7_bio(buf)
|
||||
v = s.verify(p7, data)
|
||||
assert "Test to sign" in v.decode()
|
||||
|
||||
Reference in New Issue
Block a user