This file is indexed.

/usr/share/augeas/lenses/dist/tests/test_opendkim.aug is in augeas-lenses 1.10.1-2.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
module Test_Opendkim =

  let simple_string_value = "ADSPAction discard\n"
  test Opendkim.lns get simple_string_value =
    { "ADSPAction" = "discard" } 
  test Opendkim.lns put simple_string_value after
    set "ADSPAction" "discard" = simple_string_value 

  let simple_integer_value = "AutoRestartCount 1\n"
  test Opendkim.lns get simple_integer_value =
    { "AutoRestartCount" = "1" } 
  test Opendkim.lns put simple_integer_value after
    set "AutoRestartCount" "1" = simple_integer_value

  let simple_boolean_value = "AddAllSignatureResults true\n"
  test Opendkim.lns get simple_boolean_value =
    { "AddAllSignatureResults" = "true" } 
  test Opendkim.lns put simple_boolean_value after
    set "AddAllSignatureResults" "true" = simple_boolean_value

  let yes_boolean_value= "AddAllSignatureResults yes\n"
  test Opendkim.lns get yes_boolean_value =
    { "AddAllSignatureResults" = "yes" } 
  test Opendkim.lns put yes_boolean_value after
    set "AddAllSignatureResults" "yes" = yes_boolean_value

  let one_boolean_value= "AddAllSignatureResults 1\n"
  test Opendkim.lns get one_boolean_value =
    { "AddAllSignatureResults" = "1" } 
  test Opendkim.lns put one_boolean_value after
    set "AddAllSignatureResults" "1" = one_boolean_value

  let three_type_value = "AddAllSignatureResults false\nADSPAction discard\nAutoRestartCount 2\n"
  test Opendkim.lns get three_type_value =
    { "AddAllSignatureResults" = "false" }
    { "ADSPAction" = "discard" }
    { "AutoRestartCount" = "2" } 

  test Opendkim.lns put "" after
    set "AddAllSignatureResults" "false";
    set "ADSPAction" "discard";
    set "AutoRestartCount" "2" = three_type_value

  let two_boolean_value = "AddAllSignatureResults false\nADSPNoSuchDomain true\n"
  test Opendkim.lns get two_boolean_value =
    { "AddAllSignatureResults" = "false" }
    { "ADSPNoSuchDomain" = "true" }

  test Opendkim.lns put "" after
    set "AddAllSignatureResults" "false";
    set "ADSPNoSuchDomain" "true" = two_boolean_value 

  let blank_line_between= "AddAllSignatureResults false\n\nADSPNoSuchDomain true\n"
  test Opendkim.lns get blank_line_between =
    { "AddAllSignatureResults" = "false" }
    { }
    { "ADSPNoSuchDomain" = "true" }

  test Opendkim.lns put "" after
    set "AddAllSignatureResults" "false";
    set "ADSPNoSuchDomain" "true" = "AddAllSignatureResults false\nADSPNoSuchDomain true\n" 

  let include_comment_line= "AddAllSignatureResults false\n#A comment\nADSPNoSuchDomain true\n"
  test Opendkim.lns get include_comment_line =
    { "AddAllSignatureResults" = "false" }
    { "#comment" = "A comment" }
    { "ADSPNoSuchDomain" = "true" }

  test Opendkim.lns put "" after
    set "AddAllSignatureResults" "false";
    set "#comment" "A comment";
    set "ADSPNoSuchDomain" "true" = include_comment_line  

  let default_config_file = "# This is a basic configuration that can easily be adapted to suit a standard
# installation. For more advanced options, see opendkim.conf(5) and/or
# /usr/share/doc/opendkim/examples/opendkim.conf.sample.

# Log to syslog
Syslog      yes
# Required to use local socket with MTAs that access the socket as a non-
# privileged user (e.g. Postfix)
UMask     002

# Sign for example.com with key in /etc/mail/dkim.key using
# selector '2007' (e.g. 2007._domainkey.example.com)
#Domain     example.com
#KeyFile    /etc/mail/dkim.key
#Selector   2007

# Commonly-used options; the commented-out versions show the defaults.
#Canonicalization simple
#Mode     sv
#SubDomains   no
#ADSPAction            continue

# Always oversign From (sign using actual From and a null From to prevent
# malicious signatures header fields (From and/or others) between the signer
# and the verifier.  From is oversigned by default in the Debian package
# because it is often the identity key used by reputation systems and thus
# somewhat security sensitive.
OversignHeaders   From

# List domains to use for RFC 6541 DKIM Authorized Third-Party Signatures
# (ATPS) (experimental)

#ATPSDomains    example.com
"
  test Opendkim.lns get default_config_file = 
  { "#comment" = "This is a basic configuration that can easily be adapted to suit a standard" }
  { "#comment" = "installation. For more advanced options, see opendkim.conf(5) and/or" }
  { "#comment" = "/usr/share/doc/opendkim/examples/opendkim.conf.sample." }
  {  }
  { "#comment" = "Log to syslog" }
  { "Syslog" = "yes" }
  { "#comment" = "Required to use local socket with MTAs that access the socket as a non-" }
  { "#comment" = "privileged user (e.g. Postfix)" }
  { "UMask" = "002" }
  {  }
  { "#comment" = "Sign for example.com with key in /etc/mail/dkim.key using" }
  { "#comment" = "selector '2007' (e.g. 2007._domainkey.example.com)" }
  { "#comment" = "Domain     example.com" }
  { "#comment" = "KeyFile    /etc/mail/dkim.key" }
  { "#comment" = "Selector   2007" }
  {  }
  { "#comment" = "Commonly-used options; the commented-out versions show the defaults." }
  { "#comment" = "Canonicalization simple" }
  { "#comment" = "Mode     sv" }
  { "#comment" = "SubDomains   no" }
  { "#comment" = "ADSPAction            continue" }
  {  }
  { "#comment" = "Always oversign From (sign using actual From and a null From to prevent" }
  { "#comment" = "malicious signatures header fields (From and/or others) between the signer" }
  { "#comment" = "and the verifier.  From is oversigned by default in the Debian package" }
  { "#comment" = "because it is often the identity key used by reputation systems and thus" }
  { "#comment" = "somewhat security sensitive." }
  { "OversignHeaders" = "From" }
  {  }
  { "#comment" = "List domains to use for RFC 6541 DKIM Authorized Third-Party Signatures" }
  { "#comment" = "(ATPS) (experimental)" }
  {  }
  { "#comment" = "ATPSDomains    example.com" }