/usr/share/augeas/lenses/dist/tests/test_opendkim.aug is in augeas-lenses 1.10.1-2.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | module Test_Opendkim =
let simple_string_value = "ADSPAction discard\n"
test Opendkim.lns get simple_string_value =
{ "ADSPAction" = "discard" }
test Opendkim.lns put simple_string_value after
set "ADSPAction" "discard" = simple_string_value
let simple_integer_value = "AutoRestartCount 1\n"
test Opendkim.lns get simple_integer_value =
{ "AutoRestartCount" = "1" }
test Opendkim.lns put simple_integer_value after
set "AutoRestartCount" "1" = simple_integer_value
let simple_boolean_value = "AddAllSignatureResults true\n"
test Opendkim.lns get simple_boolean_value =
{ "AddAllSignatureResults" = "true" }
test Opendkim.lns put simple_boolean_value after
set "AddAllSignatureResults" "true" = simple_boolean_value
let yes_boolean_value= "AddAllSignatureResults yes\n"
test Opendkim.lns get yes_boolean_value =
{ "AddAllSignatureResults" = "yes" }
test Opendkim.lns put yes_boolean_value after
set "AddAllSignatureResults" "yes" = yes_boolean_value
let one_boolean_value= "AddAllSignatureResults 1\n"
test Opendkim.lns get one_boolean_value =
{ "AddAllSignatureResults" = "1" }
test Opendkim.lns put one_boolean_value after
set "AddAllSignatureResults" "1" = one_boolean_value
let three_type_value = "AddAllSignatureResults false\nADSPAction discard\nAutoRestartCount 2\n"
test Opendkim.lns get three_type_value =
{ "AddAllSignatureResults" = "false" }
{ "ADSPAction" = "discard" }
{ "AutoRestartCount" = "2" }
test Opendkim.lns put "" after
set "AddAllSignatureResults" "false";
set "ADSPAction" "discard";
set "AutoRestartCount" "2" = three_type_value
let two_boolean_value = "AddAllSignatureResults false\nADSPNoSuchDomain true\n"
test Opendkim.lns get two_boolean_value =
{ "AddAllSignatureResults" = "false" }
{ "ADSPNoSuchDomain" = "true" }
test Opendkim.lns put "" after
set "AddAllSignatureResults" "false";
set "ADSPNoSuchDomain" "true" = two_boolean_value
let blank_line_between= "AddAllSignatureResults false\n\nADSPNoSuchDomain true\n"
test Opendkim.lns get blank_line_between =
{ "AddAllSignatureResults" = "false" }
{ }
{ "ADSPNoSuchDomain" = "true" }
test Opendkim.lns put "" after
set "AddAllSignatureResults" "false";
set "ADSPNoSuchDomain" "true" = "AddAllSignatureResults false\nADSPNoSuchDomain true\n"
let include_comment_line= "AddAllSignatureResults false\n#A comment\nADSPNoSuchDomain true\n"
test Opendkim.lns get include_comment_line =
{ "AddAllSignatureResults" = "false" }
{ "#comment" = "A comment" }
{ "ADSPNoSuchDomain" = "true" }
test Opendkim.lns put "" after
set "AddAllSignatureResults" "false";
set "#comment" "A comment";
set "ADSPNoSuchDomain" "true" = include_comment_line
let default_config_file = "# This is a basic configuration that can easily be adapted to suit a standard
# installation. For more advanced options, see opendkim.conf(5) and/or
# /usr/share/doc/opendkim/examples/opendkim.conf.sample.
# Log to syslog
Syslog yes
# Required to use local socket with MTAs that access the socket as a non-
# privileged user (e.g. Postfix)
UMask 002
# Sign for example.com with key in /etc/mail/dkim.key using
# selector '2007' (e.g. 2007._domainkey.example.com)
#Domain example.com
#KeyFile /etc/mail/dkim.key
#Selector 2007
# Commonly-used options; the commented-out versions show the defaults.
#Canonicalization simple
#Mode sv
#SubDomains no
#ADSPAction continue
# Always oversign From (sign using actual From and a null From to prevent
# malicious signatures header fields (From and/or others) between the signer
# and the verifier. From is oversigned by default in the Debian package
# because it is often the identity key used by reputation systems and thus
# somewhat security sensitive.
OversignHeaders From
# List domains to use for RFC 6541 DKIM Authorized Third-Party Signatures
# (ATPS) (experimental)
#ATPSDomains example.com
"
test Opendkim.lns get default_config_file =
{ "#comment" = "This is a basic configuration that can easily be adapted to suit a standard" }
{ "#comment" = "installation. For more advanced options, see opendkim.conf(5) and/or" }
{ "#comment" = "/usr/share/doc/opendkim/examples/opendkim.conf.sample." }
{ }
{ "#comment" = "Log to syslog" }
{ "Syslog" = "yes" }
{ "#comment" = "Required to use local socket with MTAs that access the socket as a non-" }
{ "#comment" = "privileged user (e.g. Postfix)" }
{ "UMask" = "002" }
{ }
{ "#comment" = "Sign for example.com with key in /etc/mail/dkim.key using" }
{ "#comment" = "selector '2007' (e.g. 2007._domainkey.example.com)" }
{ "#comment" = "Domain example.com" }
{ "#comment" = "KeyFile /etc/mail/dkim.key" }
{ "#comment" = "Selector 2007" }
{ }
{ "#comment" = "Commonly-used options; the commented-out versions show the defaults." }
{ "#comment" = "Canonicalization simple" }
{ "#comment" = "Mode sv" }
{ "#comment" = "SubDomains no" }
{ "#comment" = "ADSPAction continue" }
{ }
{ "#comment" = "Always oversign From (sign using actual From and a null From to prevent" }
{ "#comment" = "malicious signatures header fields (From and/or others) between the signer" }
{ "#comment" = "and the verifier. From is oversigned by default in the Debian package" }
{ "#comment" = "because it is often the identity key used by reputation systems and thus" }
{ "#comment" = "somewhat security sensitive." }
{ "OversignHeaders" = "From" }
{ }
{ "#comment" = "List domains to use for RFC 6541 DKIM Authorized Third-Party Signatures" }
{ "#comment" = "(ATPS) (experimental)" }
{ }
{ "#comment" = "ATPSDomains example.com" }
|