blob: 6c3384b845f40ccb2670062fd243232bd6958844 [file] [log] [blame]
#!/usr/bin/perl -T
# run with: sudo prove -v t/root_spamd*
use lib '.'; use lib 't';
use SATest; sa_t_init("root_spamd_x_u");
use constant HAS_SUDO => eval { $_ = untaint_cmd("which sudo 2>/dev/null"); chomp; -x };
use Test::More;
plan skip_all => "root tests disabled" unless conf_bool('run_root_tests');
plan skip_all => "not running tests as root" unless eval { ($> == 0); };
plan skip_all => "sudo executable not found in path" unless HAS_SUDO;
plan tests => 14;
# ---------------------------------------------------------------------------
%patterns = (
q{ Return-Path: sb55sb55@yahoo.com}, 'firstline',
q{ Subject: There yours for FREE!}, 'subj',
q{ X-Spam-Status: Yes, score=}, 'status',
q{ X-Spam-Flag: YES}, 'flag',
q{ X-Spam-Level: **********}, 'stars',
q{ TEST_ENDSNUMS}, 'endsinnums',
q{ TEST_NOREALNAME}, 'noreal',
q{ This must be the very last line}, 'lastline',
);
# run spamc as unpriv uid
$spamc = "sudo -u nobody $spamc";
ok (start_spamd ("-L -x -u nobody"));
ok(spamcrun("< data/spam/001", \&patterns_run_cb));
ok_all_patterns();
%patterns = (
q{ X-Spam-Status: Yes, score=}, 'status',
q{ X-Spam-Flag: YES}, 'flag',
);
ok (spamcrun("< data/spam/018", \&patterns_run_cb));
ok_all_patterns();
ok(stop_spamd());