blob: c53ac2d145f044c88e5ae76aeb891d9936000543 [file] [log] [blame]
#!/usr/bin/perl -T
# run with: sudo prove -v t/root_spamd*
use lib '.'; use lib 't';
use SATest; sa_t_init("root_spamd_virtual");
use constant HAS_SUDO => eval { $_ = untaint_cmd("which sudo 2>/dev/null"); chomp; -x };
use Test::More;
plan skip_all => "root tests disabled" unless conf_bool('run_root_tests');
plan skip_all => "not running tests as root" unless eval { ($> == 0); };
plan skip_all => "sudo executable not found in path" unless HAS_SUDO;
plan tests => 14;
# ---------------------------------------------------------------------------
%patterns = (
q{ Return-Path: sb55sb55@yahoo.com}, 'firstline',
q{ Subject: There yours for FREE!}, 'subj',
q{ X-Spam-Status: Yes, score=}, 'status',
q{ X-Spam-Flag: YES}, 'flag',
q{ X-Spam-Level: **********}, 'stars',
q{ TEST_ENDSNUMS}, 'endsinnums',
q{ TEST_NOREALNAME}, 'noreal',
q{ This must be the very last line}, 'lastline',
);
# run spamc as unpriv uid
$spamc = "sudo -u nobody $spamc";
ok (start_spamd ("--virtual-config-dir=log/virtualconfig/%u -L -u nobody"));
ok(spamcrun("< data/spam/001", \&patterns_run_cb));
ok_all_patterns();
%patterns = (
q{ X-Spam-Status: Yes, score=}, 'status',
q{ X-Spam-Flag: YES}, 'flag',
);
ok (spamcrun("< data/spam/018", \&patterns_run_cb));
ok_all_patterns();
ok(stop_spamd());