Show HN: A fake SMTP server for software integration testing
This website, fakemail.stream, offers a fake SMTP server for software testing. Users can access it anonymously with TLS security. It provides email monitoring and credential generation. Copyrighted by aled@wibblr.com.
Read original articleThis website, fakemail.stream, offers a fake SMTP server for software integration testing purposes. Users can access the server anonymously with the host set to fakemail.stream, port 587, and security using TLS. The site provides the option to generate credentials for access. It allows users to monitor various email parameters such as timestamp, sender, recipient, subject, body, and attachments. The platform indicates it is waiting for emails to arrive, suggesting a simulated environment for testing email functionalities. The website is copyrighted by aled@wibblr.com for the years 2022 to 2024, with additional information available on the GitHub page at https://github.com/aled/fakemail.
Related
- Users share their experiences and preferences for similar tools, such as Mailpit, Mailcatcher, MailHog, and MailSlurper.
- Some users emphasize the importance of self-hosting and controlling the test SMTP server to ensure security and reliability.
- There are suggestions for improving the service, including self-hosting options and handling rate-limiting issues.
- Several users provide technical insights and alternative methods for setting up test email environments, including using Postfix and custom scripts.
- One user highlights that the service is open source and available on GitHub for self-hosting.
The “OG” I would consider Mailcatcher [2] from my Rails days
pünicode.com. Any local part will create a temp cache that you can check to see if your email system can deliver to international local and/or domain parts. EG, send an email to josé@pünicode.com and see it show up at pünicode.com/emails/josé.
I too have one, but it is very barebones. No GUI, no API. I suspect it would fail in many cases that the others handle, but it is fine for my test environment. That environment is basically a bunch of services from work that in production run on separate servers all shoved into one test VM with a firewall that blocks most outgoing connections to keep things from escaping.
The firewall reroutes any attempted outgoing port 25 connections to localhost port 2000, which my fake SMTP server listens on. When something connections it creates a timestamped file, sends them a "220 hello" message, and then loops reading what they send. Everything they send is copied to the file.
If they send a "quit" command it sends back "221 bye" and disconnects and closed the output file.
If they send a "data" command it sends back "354 send the message" and then loops until they send a "." line. When they send that it sends back "250 OK".
If they send anything else it just says "250 OK".
That ridiculously small subset of SMTP turns out to be fine in my environment.
Here it is in case anyone might actually find it useful [1]. Building and running is simple. It's a single Java file, SmtpSink.java. Put that somewhere, "mkdir msgs" there, "javac SmtpSink.java", and then "java SmtpSink". The data for each connection will be in the msgs directory.
So, it's called fakemail but there is a real SMTP server in there. Attachments should work fine. Getting the web app to create SMTP accounts was quite tricky, I'm sure there are better ways but I ended up implementing the unix crypt() algorithm in C#.
Server is holding up fine so far (there was a rate-limiting bug which brought the site down yesterday). Logs show 37K unique IPs have accessed it since yesterday, and it seems to be using about 1% of the CPU (it's on a free VM in the Oracle Cloud).
There is a whole API sitting behind the web page, including proper authentication, but the frontend is very much a MVP.
Very few actual emails have been sent to it, so I'd love it if people could actually send stuff. There are a bunch of websites that can be used to send test mails, e.g.
https://www.gmass.co/smtp-test
Comes with a small API so your integration tests can actually check the contents of emails that were expected to be sent out. Did a Show HN a while ago with more details - https://news.ycombinator.com/item?id=40590670
I had no idea on the availability of all the various options, which leads to the question: Where would one find examples of similar network test servers for other protocols/functions?
For example:
- A SAML IdP - Define accounts and complete a login, allow debug of request/response.
- A DNS Server - Define local domains and records, control whether Internet domains are resolvable or just local ‘corporate’ records.
- Syslog Server - Catch logs and make them temporarily available. (usually syslogd works for this, but maybe test harnesses have advantages).
- SNMP - Trap destination to capture/show alerts
Of course nobody has ever observed my rule.
Doesn't make it a bad rule...
anyway - i got a great 429 back with a suggested try-after -time. it made me smile in appreciation!
well done!
You really want, whenever possible, to test everything using real tools. Doubly so, using tools you'll use it PROD. However, at least postfix is de-facto standard.
apt-get install postfix, postfix-pcre bsd-mailx, config and done.
Here's an example redirecting ALL outgoing emails, UNLESS they are to your OK domains. Redirects are sent to an alias in /etc/aliases, which you can point to anything. (Easier for DEVs to modify when required)...
/etc/postfix/header_checks (adds a header with original TO)
/^(.*)@((?:(?![^\.]+.corp-domain1.com|anotherdomain.ca|localhost).)*)$/ PREPEND DEV-ENV-REDIRECT: ${1}@${2}
This MUST be the same as the above regex, so that the TO preservation + redirect are both done in tandem.. /etc/postfix/recipient_canonical_map
/^(.*)@((?:(?![^\.]+.corp-domain1.com|anotherdomain.ca|localhost).)*)$/ externalredirect@localhost
Then in main.cf # added
recipient_canonical_classes = envelope_recipient
recipient_canonical_maps = pcre:/etc/postfix/recipient_canonical_map
local_header_rewrite_clients = permit_mynetworks
#
header_checks = pcre:/etc/postfix/header_checks
Then in /etc/aliases: #
externalredirect: dev
# dev's email.. (default unless set)
dev: /dev/null
Preserving the original TO as another header ensures you can debug if required, whilst preserving 100% the original mail body.Using a second redirect in aliases, allows you do something such as:
/etc/aliases:
#
externalredirect: dev, another_email_address_for_logs
# dev's email.. (default unless set)
dev: /dev/null
So it's super easy for a dev to just change: dev: /dev/null
to dev: dev@corp.com
Without the need to worry about overall redirect stuff.NOTE that if you don't have a unique email for your company's DEVs to use, this won't work, HOWEVER... you can redirect with more refined controls above.
That is, instead of saying "if it's not to a company domain, then redirect this DEV TEST email!", you can "If not to this specific email address, then redirect to this specific email address".
The reason I have this setup to redirect of not corp domain, is that the env I have this deployed in is byte per byte 100% identical to PROD deployment, with only very, very, very, minor tweaks. About 20 bytes or so.
That way, all tests done in DEV are 100% identical to configs in PROD. You eliminate PROD deploy bugs more aptly this way. And so if local MTAs are postfix in PROD, then you can keep all of your PROD postfix configs, with these minor changes to lock down DEV. And, you can keep the all the config files, all the config, and just have empty header_checks, recipient_canonical_map files.
But this means that alert emails that might get send from PROD have genericized domains, so in such envs it's easier to NOT redirect corp dest emails carte blanche, and then send everything else to a redirect dest.
That way monitoring / emerg emails get through unvarnished.