--- /dev/null
+*** Settings ***
+Suite Setup Antivirus Setup
+Suite Teardown Antivirus Teardown
+Library Process
+Library ${TESTDIR}/lib/rspamd.py
+Resource ${TESTDIR}/lib/rspamd.robot
+Variables ${TESTDIR}/lib/vars.py
+
+*** Variables ***
+${CONFIG} ${TESTDIR}/configs/plugins.conf
+${MESSAGE} ${TESTDIR}/messages/spam_message.eml
+${MESSAGE2} ${TESTDIR}/messages/freemail.eml
+${REDIS_SCOPE} Suite
+${RSPAMD_SCOPE} Suite
+${URL_TLD} ${TESTDIR}/../lua/unit/test_tld.dat
+
+*** Test Cases ***
+CLAMAV MISS
+ Run Dummy Clam ${PORT_CLAM}
+ ${result} = Scan Message With Rspamc ${MESSAGE}
+ Check Rspamc ${result} CLAM_VIRUS inverse=1
+
+CLAMAV HIT
+ Run Dummy Clam ${PORT_CLAM} 1
+ ${result} = Scan Message With Rspamc ${MESSAGE2}
+ Check Rspamc ${result} CLAM_VIRUS (1.00)[Eicar-Test-Signature]
+ Should Not Contain ${result.stdout} FPROT_
+
+CLAMAV CACHE HIT
+ ${result} = Scan Message With Rspamc ${MESSAGE2}
+ Check Rspamc ${result} CLAM_VIRUS (1.00)[Eicar-Test-Signature]
+ Should Not Contain ${result.stdout} FPROT_
+
+CLAMAV CACHE MISS
+ ${result} = Scan Message With Rspamc ${MESSAGE}
+ Check Rspamc ${result} CLAM_VIRUS inverse=1
+ Should Not Contain ${result.stdout} FPROT_
+
+FPROT MISS
+ Run Dummy Fprot ${PORT_FPROT}
+ ${result} = Scan Message With Rspamc ${MESSAGE2}
+ Check Rspamc ${result} FPROT_VIRUS inverse=1
+ Should Not Contain ${result.stdout} FPROT_EICAR
+
+FPROT HIT - PATTERN
+ Run Dummy Fprot ${PORT_FPROT} 1
+ ${result} = Scan Message With Rspamc ${MESSAGE}
+ Check Rspamc ${result} FPROT_EICAR (1.00)[EICAR_Test_File]
+ Should Not Contain ${result.stdout} CLAMAV_VIRUS
+
+FPROT CACHE HIT
+ ${result} = Scan Message With Rspamc ${MESSAGE}
+ Check Rspamc ${result} FPROT_EICAR (1.00)[EICAR_Test_File]
+ Should Not Contain ${result.stdout} CLAMAV_VIRUS
+
+FPROT CACHE MISS
+ ${result} = Scan Message With Rspamc ${MESSAGE2}
+ Check Rspamc ${result} FPROT_ inverse=1
+
+*** Keywords ***
+Antivirus Setup
+ ${PLUGIN_CONFIG} = Get File ${TESTDIR}/configs/antivirus.conf
+ Set Suite Variable ${PLUGIN_CONFIG}
+ Generic Setup PLUGIN_CONFIG
+ Run Redis
+
+Antivirus Teardown
+ Normal Teardown
+ Shutdown Process With Children ${REDIS_PID}
+ Wait For Port ${SOCK_STREAM} ${LOCAL_ADDR} ${REDIS_PORT}
+
+Run Dummy Clam
+ [Arguments] ${port} ${found}=
+ Wait For Port ${SOCK_STREAM} ${LOCAL_ADDR} ${port}
+ ${result} = Start Process ${TESTDIR}/util/dummy_clam.py ${port} ${found}
+
+Run Dummy Fprot
+ [Arguments] ${port} ${found}=
+ Wait For Port ${SOCK_STREAM} ${LOCAL_ADDR} ${port}
+ ${result} = Start Process ${TESTDIR}/util/dummy_fprot.py ${port} ${found}
--- /dev/null
+#!/usr/bin/env python
+
+import os
+import sys
+try:
+ import SocketServer as socketserver
+except:
+ import socketserver
+
+class MyTCPHandler(socketserver.BaseRequestHandler):
+
+ def handle(self):
+ self.data = self.request.recv(1024).strip()
+ if self.server.foundvirus:
+ self.request.sendall(b"stream: Eicar-Test-Signature FOUND\0")
+ else:
+ self.request.sendall(b"stream: OK\0")
+ self.request.close()
+
+if __name__ == "__main__":
+ pid = os.fork()
+ if pid > 0:
+ sys.exit(0)
+
+ HOST = "localhost"
+
+ alen = len(sys.argv)
+ if alen > 1:
+ port = int(sys.argv[1])
+ if alen >= 3:
+ foundvirus = bool(sys.argv[2])
+ else:
+ foundvirus = False
+ else:
+ port = 3310
+ foundvirus = False
+
+ server = socketserver.TCPServer((HOST, port), MyTCPHandler, bind_and_activate=False)
+ server.allow_reuse_address = True
+ server.foundvirus = foundvirus
+ server.server_bind()
+ server.server_activate()
+ server.handle_request()
+ server.server_close()
+ os.exit(0)
--- /dev/null
+#!/usr/bin/env python
+
+import os
+import sys
+try:
+ import SocketServer as socketserver
+except:
+ import socketserver
+
+class MyTCPHandler(socketserver.BaseRequestHandler):
+
+ def handle(self):
+ self.data = self.request.recv(1024).strip()
+ if self.server.foundvirus:
+ self.request.sendall(b"1 <infected: EICAR_Test_File> FOO\n")
+ else:
+ self.request.sendall(b"0 <clean> FOO\n")
+ self.request.close()
+
+if __name__ == "__main__":
+ pid = os.fork()
+ if pid > 0:
+ sys.exit(0)
+
+ HOST = "localhost"
+
+ alen = len(sys.argv)
+ if alen > 1:
+ port = int(sys.argv[1])
+ if alen >= 3:
+ foundvirus = bool(sys.argv[2])
+ else:
+ foundvirus = False
+ else:
+ port = 10200
+ foundvirus = False
+
+ server = socketserver.TCPServer((HOST, port), MyTCPHandler, bind_and_activate=False)
+ server.allow_reuse_address = True
+ server.foundvirus = foundvirus
+ server.server_bind()
+ server.server_activate()
+ server.handle_request()
+ server.server_close()
+ os.exit(0)