On my way to become (again) a CPANTESTER (en/fr)

I've been a huge fan of CPAN Testing for quite a long time now.
I've even been a CPANTester.

But things have changed a lot, the tools are now numerous and impressive to allow bigger and better testing.
Some testers achieved more than 70 000 reports a month !
As a stat junkie I see it as a challenge...

My first step to become a CPANTester is to allow sending report from my home (dynamic ADSL IP) server, through my online hosted virtual server.

As it took me some time to setup the proper configuration*, below are the postfix configurations for SASL authentication on the SMTP server and client :
* So much time in fact that, I even thought about ssh tunneling

[French translation]

Je suis un grand fan du testing CPAN depuis un bon moment.
J'ai même été un CPANTester autrefois.

Mais les choses ont beaucoup changé, les outils sont maintenant nombreux et impressionnant pour permettre de tester plus et mieux.
Certains testeurs arrivent à produire plus de 70 000 rapports en un mois.
En tant qu'accro aux stats, je le vois comme un défi...

Mon premier pas pour devenir un CPANTester est de permettre l'envoi de rapport de mon serveur à la maison (IP dynamique ADSL) via mon serveur virtuel hébergé enligne.

Comme ça m'a pris du temps pour déterminer la bonne configuration*, ci-dessous les configurations postfix pour l'authentification SASL sur le serveur et le client SMTP :
*Tellement de temps en fait, que j'ai même pensé au tunneling ssh.

**** On the Server (hosted virtual server with fixed IP) ****
#
# in /etc/postfix/main.cf
#
#smtpd_sasl_auth_enable = yes
smtpd_sasl_type = dovecot
smtpd_sasl_path = private/dovecot-auth
smtpd_sasl_authenticated_header = yes
smtpd_sasl_security_options = noanonymous
smtpd_sasl_local_domain = $myhostname
broken_sasl_auth_clients = yes


**** On the Client (ADSL box with dynamic IP) ****
#
# in /etc/postfix/main.cf
#
# SASL details
#
# no for the server
smtpd_sasl_auth_enable = no
# but yes when we act as a client
smtp_sasl_auth_enable = yes
# where we store the hashed UID and password
smtp_sasl_password_maps = hash:/etc/postfix/sasl/saslpw
# security options set to disallow anon auth (but allow plaintext within the TLS
smtp_sasl_security_options = noanonymous
# our upstream relay is here
relayhost = [www.mydomain.com]

#
# in /etc/postfix/sasl/saslpw
# (don't forget postmap /etc/postfix/sasl/saslpw after update)
#
[www.mydomain.com] userontheserver:passontheserver

Commentaires

Posts les plus consultés de ce blog

Change your Gogs admin password

JavaScript for Perl lovers.

What is the average salary for Perl programmers in 2020?