fix root mail on bk, nonroot stuff, misc prom updates
[distro-setup] / mailtest-check
1 #!/bin/bash
2
3 # Usage: mail-test-check [slow] [anything]
4 #
5 # slow: do slow checks, like spamassassin
6 #
7 # anything: consider non-interactive, dont print unless something went
8 # wrong
9
10
11 source /b/errhandle/err
12
13 [[ $EUID == 0 ]] || exec sudo -E "${BASH_SOURCE[0]}" "$@"
14
15 shopt -s nullglob
16
17 e() { $int || return 0; printf "mailtest-check: %s\n" "$*"; }
18
19
20 ## Minutes before we give error.
21 # We run this cronjob along with sending the test email every 5 minutes,
22 # so give it 1 minute to arrive, then if the latest email is older than
23 # 7 minutes, the last 2 haven't arrived in a reasonable amount of time.
24 min_limit=8
25
26
27 # spamassassin checking takes about 8 seconds. only do that every
28 # once in a while.
29 slow=false
30 if [[ $1 == slow ]]; then
31 slow=true
32 shift
33 fi
34
35 int=false
36 if [[ $SUDO_USER || $SSH_CONNECTION ]]; then
37 int=true
38 fi
39
40 if [[ $1 == int ]]; then
41 int=true
42 fi
43
44 if [[ $1 == nonint ]]; then
45 int=false
46 fi
47
48
49 if ! $int; then
50 sleep 60
51 fi
52
53 # avoid errors like this:
54 # Nov 8 08:16:05.439 [6080] warn: plugin: failed to parse plugin (from @INC): Can't locate Mail/SpamAssassin/Plugin/WLBLEval.pm: lib/Mail/SpamAssassin/Plugin/WLBLEval.pm: Permission denied at (eval 59) line 1.
55 #Nov 8 08:16:05.439 [6080] warn: plugin: failed to parse plugin (from @INC): Can't locate Mail/SpamAssassin/Plugin/VBounce.pm: lib/Mail/SpamAssassin/Plugin/VBounce.pm: Permission denied at (eval 60) line 1.
56 # i dont know why, i just found the solution online
57 cd /m/md
58
59 case $HOSTNAME in
60 bk)
61 folders=(/m/md/{expertpathologyreview.com,amnimal.ninja}/testignore)
62 froms=(ian@iankelling.org z@zroe.org testignore@je.b8.nz iank@gnu.org)
63 ;;
64 je)
65 froms=(ian@iankelling.org z@zroe.org testignore@expertpathologyreview.com testignore@amnimal.ninja)
66 folders=(/m/md/je.b8.nz/testignore)
67 ;;
68 *)
69 folders=(/m/md/l/testignore)
70 froms=(testignore@je.b8.nz testignore@expertpathologyreview.com testignore@amnimal.ninja ian@iankelling.org z@zroe.org iank@gnu.org)
71 if ! $int; then
72 timeout 120 rsync --chown iank:iank -e "ssh -oIdentitiesOnly=yes -F /dev/null -i /root/.ssh/jtuttle" -t --inplace -r 'jtuttle@fencepost.gnu.org:/home/j/jtuttle/Maildir/new/' /m/md/l/testignore/new
73 fi
74 ;;
75 esac
76
77 getspamdpid() {
78 if [[ ! $spamdpid || ! -d /proc/$spamdpid ]]; then
79 spamdpid=$(systemctl show --property MainPID --value spamassassin | sed 's/^1$//' ||:)
80 fi
81 }
82 getspamdpid
83 pr() {
84 if [[ -e /var/lib/prometheus/node-exporter ]]; then
85 cat >>/var/lib/prometheus/node-exporter/mailtest-check.prom.$$
86 fi
87 }
88 pr <<EOF
89 mailtest_check_found_spamd_pid_bool $(( ${spamdpid:-0} > 0 ))
90 EOF
91 e spamdpid: $spamdpid
92 if [[ ! $spamdpid ]]; then
93 echo $HOSTNAME mailtest spamd pid not found. systemctl status spamassassin:
94 systemctl status spamassassin
95 fi
96 tmpfile=$(mktemp)
97 declare -i unexpected=0
98 for folder in ${folders[@]}; do
99 for from in ${froms[@]}; do
100 latest=
101 last_sec=0
102
103 if ! grep -rlFx "From: $from" $folder/{new,cur} >$tmpfile; then
104 e "no message found from: $from"
105 continue
106 fi
107 # webmail sends them to cur it seems
108 while read -r file; do
109 if [[ $file -nt $latest ]]; then
110 latest=$file
111 fi
112 done <$tmpfile
113
114 if [[ ! $latest ]]; then
115 # 10 is an arbitrary bad value
116 unexpected+=10
117 else
118 to=$(awk '/^Envelope-to: / {print $2}' $latest)
119 last_sec=$(awk '/^Subject: / {print $4}' $latest)
120
121 if $slow; then
122 if ! $int; then
123 find $folder/new $folder/cur -type f -mmin +1080 -delete
124 fi
125 getspamdpid
126 if [[ $spamdpid ]]; then
127 if [[ $(readlink /proc/$$/ns/net) != "$(readlink /proc/$spamdpid/ns/net)" ]]; then
128 spamcpre="nsenter -t $spamdpid -n -m"
129 fi
130
131 declare -A results
132 # pyzor fails for our test message, so dont put useless load on their
133 # servers.
134 # example line that sed is parsing:
135 # (-0.1 / 5.0 requ) DKIM_SIGNED=0.1,DKIM_VALID=-0.1,DKIM_VALID_AU=-0.1,SPF_HELO_PASS=-0.001,SPF_PASS=-0.001,TVD_SPACE_RATIO=0.001 autolearn=_AUTOLEARN
136 for r in $($spamcpre sudo -u Debian-exim spamassassin -t --cf='score PYZOR_CHECK 0' <"$latest" | tail -n2 | head -n1 | sed -r 's/^\([^)]*\) *//;s/=[^, ]*([, ]|$)/ /g'); do
137 case $r in
138 # got this in an update 2022-01. dun care
139 T_SCC_BODY_TEXT_LINE|SCC_BODY_SINGLE_WORD) : ;;
140 # we have a new domain, ignore this.
141 # it seems like some versions of spamassassin do BODY_SINGLE_WORD, others dont, we dun care.
142 # bayes_00 is a new one indicating ham, we dont care if its missing.
143 BAYES_00|BODY_SINGLE_WORD|FROM_FMBLA_NEWDOM*|autolearn) : ;;
144 SPF_HELO_NEUTRAL)
145 # some of my domains use neutral spf, treat them the same.
146 results[SPF_HELO_PASS]=t
147 ;;
148 *)
149 results[$r]=t
150 ;;
151 esac
152 done
153 # debugging
154 # e results = ${!results[@]}
155 missing=()
156
157 keys=(DKIM_SIGNED DKIM_VALID{,_AU,_EF} SPF_HELO_PASS SPF_PASS TVD_SPACE_RATIO)
158 if [[ $to == *@gnu.org && $from == *@gnu.org ]]; then
159 keys=(ALL_TRUSTED TVD_SPACE_RATIO)
160 elif [[ $to == *@gnu.org ]]; then
161 # eggs has RCVD_IN_DNSWL_MED
162 keys+=(RCVD_IN_DNSWL_MED)
163 elif [[ $from == *@gnu.org ]]; then
164 # eggs has these
165 keys+=(RCVD_IN_DNSWL_MED DKIMWL_WL_HIGH)
166 fi
167
168 for t in ${keys[@]}; do
169 if [[ ${results[$t]} ]]; then
170 unset "results[$t]"
171 elif [[ $t == DKIM_VALID_EF && $from == *@[^.]*.[^.]*.[^.]* ]]; then
172 :
173 # third level domains dont hit this. its because
174 # /usr/share/perl5/Mail/SpamAssassin/Plugin/DKIM.pm checks
175 # if its signed with the registryboundaries domain. afaik:
176 # we need the actual domain to sign it, this would result in
177 # a second signature. I only use second level domains for
178 # testing atm, fsf doesnt use them for anything but the
179 # forum and I dont expect that to have any deliverability
180 # problems. So, not bothering atm.
181 else
182 missing+=($t)
183 fi
184 done
185 if (( ${#results[@]} || ${#missing[@]} )); then
186 printf "$HOSTNAME spamtest %s/%s\n" "$latest"
187 if (( ${#results[@]} )); then
188 printf "unexpected %s" "${!results[*]} "
189 fi
190 if (( ${#missing[@]} )); then
191 printf "missing %s" "${missing[*]}"
192 fi
193 echo
194 echo mailtest-check: cat $latest:
195 cat $latest
196 echo mailtest-check: end of cat
197 printf "$(tput setaf 5 2>/dev/null ||:)█$(tput sgr0 2>/dev/null||:)%.0s" $(eval echo "{1..${COLUMNS:-60}}")
198 fi
199 fi # if spamdpid
200 fi # if $slow
201 fi # if [[ $latest ]]
202
203 now=$(date +%s)
204 limit=$(( now - 60 * min_limit ))
205 age_sec=$(( now - last_sec ))
206 e $((age_sec / 60)):$(( age_sec % 60 )) ago. to:$to from:$from $latest
207
208 if (( last_sec <= limit )); then
209 echo $HOSTNAME mailtest $folder $from $(date -d @$last_sec +'%a %m-%d %H:%M')
210 fi
211 # usec = unix seconds
212 pr <<EOF
213 mailtest_check_last_usec{folder="$folder",from="$from"} $last_sec
214 EOF
215 done
216 done
217 if $slow; then
218 pr <<EOF
219 mailtest_check_unexpected_spamd_results $unexpected
220 EOF
221 fi
222
223 dir=/var/lib/prometheus/node-exporter
224 if [[ -e $dir ]]; then
225 mv $dir/mailtest-check.prom.$$ $dir/mailtest-check.prom
226 fi