#!/usr/bin/perl -T use lib '.'; use lib 't'; use SATest; sa_t_init("db_awl_path"); use Test::More tests => 4; use IO::File; # --------------------------------------------------------------------------- %is_spam_patterns = ( q{ X-Spam-Status: Yes}, 'isspam', ); # We can't easily test to see if a given AWL was used. so what we do # is tell SpamAssassin to use an inaccessible one, then verify that # the address in question was *not* whitelisted successfully. ' open (OUT, ">log/awl"); print OUT "file created to block AWL from working; AWL expects a dir"; close OUT; tstprefs (" $default_cf_lines auto_whitelist_path ./log/awl/shouldbeinaccessible auto_whitelist_file_mode 0755 "); my $fh = IO::File->new_tmpfile(); ok($fh); open(STDERR, ">&=".fileno($fh)) || die "Cannot reopen STDERR"; sarun("--add-addr-to-whitelist whitelist_test\@whitelist.spamassassin.taint.org", \&patterns_run_cb); seek($fh, 0, 0); my $error = do { local $/; <$fh>; }; diag $error; like($error, qr/(cannot create tmp lockfile)|(unlink of lock file.*failed)/, "Check we get the right error back"); # and this mail should *not* be whitelisted as a result. %patterns = %is_spam_patterns; sarun ("-L -t < data/spam/004", \&patterns_run_cb); ok_all_patterns(); ok(unlink 'log/awl'); # need a little cleanup