CodeLiturgy.Dashboard/CodeLiturgy.Views/Augeas/lens/tests/test_opendkim.aug

184 lines
7.6 KiB
Plaintext
Raw Permalink Normal View History

2022-12-05 02:07:41 +03:00
module Test_Opendkim =
let simple_string_value = "ADSPAction discard\n"
test Opendkim.lns get simple_string_value =
{ "ADSPAction" = "discard" }
test Opendkim.lns put simple_string_value after
set "ADSPAction" "discard" = simple_string_value
let simple_integer_value = "AutoRestartCount 1\n"
test Opendkim.lns get simple_integer_value =
{ "AutoRestartCount" = "1" }
test Opendkim.lns put simple_integer_value after
set "AutoRestartCount" "1" = simple_integer_value
let simple_boolean_value = "AddAllSignatureResults true\n"
test Opendkim.lns get simple_boolean_value =
{ "AddAllSignatureResults" = "true" }
test Opendkim.lns put simple_boolean_value after
set "AddAllSignatureResults" "true" = simple_boolean_value
let yes_boolean_value= "AddAllSignatureResults yes\n"
test Opendkim.lns get yes_boolean_value =
{ "AddAllSignatureResults" = "yes" }
test Opendkim.lns put yes_boolean_value after
set "AddAllSignatureResults" "yes" = yes_boolean_value
let one_boolean_value= "AddAllSignatureResults 1\n"
test Opendkim.lns get one_boolean_value =
{ "AddAllSignatureResults" = "1" }
test Opendkim.lns put one_boolean_value after
set "AddAllSignatureResults" "1" = one_boolean_value
let one_boolean_value_uppercase_yes = "AutoRestart Yes\n"
test Opendkim.lns get one_boolean_value_uppercase_yes =
{ "AutoRestart" = "Yes" }
test Opendkim.lns put one_boolean_value_uppercase_yes after
set "AutoRestart" "Yes" = one_boolean_value_uppercase_yes
let one_boolean_value_uppercase_no = "AutoRestart No\n"
test Opendkim.lns get one_boolean_value_uppercase_no =
{ "AutoRestart" = "No" }
test Opendkim.lns put one_boolean_value_uppercase_no after
set "AutoRestart" "No" = one_boolean_value_uppercase_no
let one_boolean_value_uppercase_true = "AutoRestart True\n"
test Opendkim.lns get one_boolean_value_uppercase_true =
{ "AutoRestart" = "True" }
test Opendkim.lns put one_boolean_value_uppercase_true after
set "AutoRestart" "True" = one_boolean_value_uppercase_true
let one_boolean_value_uppercase_false = "AutoRestart False\n"
test Opendkim.lns get one_boolean_value_uppercase_false =
{ "AutoRestart" = "False" }
test Opendkim.lns put one_boolean_value_uppercase_false after
set "AutoRestart" "False" = one_boolean_value_uppercase_false
let string_value_starting_with_number = "AutoRestartRate 10/1h\n"
test Opendkim.lns get string_value_starting_with_number =
{ "AutoRestartRate" = "10/1h" }
test Opendkim.lns put string_value_starting_with_number after
set "AutoRestartRate" "10/1h" = string_value_starting_with_number
let string_value_containing_slash = "TrustAnchorFile /usr/share/dns/root.key\n"
test Opendkim.lns get string_value_containing_slash =
{ "TrustAnchorFile" = "/usr/share/dns/root.key" }
test Opendkim.lns put string_value_containing_slash after
set "TrustAnchorFile" "/usr/share/dns/root.key" = string_value_containing_slash
let logwhy_keyword_boolean = "LogWhy Yes\n"
test Opendkim.lns get logwhy_keyword_boolean =
{ "LogWhy" = "Yes" }
test Opendkim.lns put logwhy_keyword_boolean after
set "LogWhy" "Yes" = logwhy_keyword_boolean
let three_type_value = "AddAllSignatureResults false\nADSPAction discard\nAutoRestartCount 2\n"
test Opendkim.lns get three_type_value =
{ "AddAllSignatureResults" = "false" }
{ "ADSPAction" = "discard" }
{ "AutoRestartCount" = "2" }
test Opendkim.lns put "" after
set "AddAllSignatureResults" "false";
set "ADSPAction" "discard";
set "AutoRestartCount" "2" = three_type_value
let two_boolean_value = "AddAllSignatureResults false\nADSPNoSuchDomain true\n"
test Opendkim.lns get two_boolean_value =
{ "AddAllSignatureResults" = "false" }
{ "ADSPNoSuchDomain" = "true" }
test Opendkim.lns put "" after
set "AddAllSignatureResults" "false";
set "ADSPNoSuchDomain" "true" = two_boolean_value
let blank_line_between= "AddAllSignatureResults false\n\nADSPNoSuchDomain true\n"
test Opendkim.lns get blank_line_between =
{ "AddAllSignatureResults" = "false" }
{ }
{ "ADSPNoSuchDomain" = "true" }
test Opendkim.lns put "" after
set "AddAllSignatureResults" "false";
set "ADSPNoSuchDomain" "true" = "AddAllSignatureResults false\nADSPNoSuchDomain true\n"
let include_comment_line= "AddAllSignatureResults false\n#A comment\nADSPNoSuchDomain true\n"
test Opendkim.lns get include_comment_line =
{ "AddAllSignatureResults" = "false" }
{ "#comment" = "A comment" }
{ "ADSPNoSuchDomain" = "true" }
test Opendkim.lns put "" after
set "AddAllSignatureResults" "false";
set "#comment" "A comment";
set "ADSPNoSuchDomain" "true" = include_comment_line
let default_config_file = "# This is a basic configuration that can easily be adapted to suit a standard
# installation. For more advanced options, see opendkim.conf(5) and/or
# /usr/share/doc/opendkim/examples/opendkim.conf.sample.
# Log to syslog
Syslog yes
# Required to use local socket with MTAs that access the socket as a non-
# privileged user (e.g. Postfix)
UMask 002
# Sign for example.com with key in /etc/mail/dkim.key using
# selector '2007' (e.g. 2007._domainkey.example.com)
#Domain example.com
#KeyFile /etc/mail/dkim.key
#Selector 2007
# Commonly-used options; the commented-out versions show the defaults.
#Canonicalization simple
#Mode sv
#SubDomains no
#ADSPAction continue
# Always oversign From (sign using actual From and a null From to prevent
# malicious signatures header fields (From and/or others) between the signer
# and the verifier. From is oversigned by default in the Debian package
# because it is often the identity key used by reputation systems and thus
# somewhat security sensitive.
OversignHeaders From
# List domains to use for RFC 6541 DKIM Authorized Third-Party Signatures
# (ATPS) (experimental)
#ATPSDomains example.com
"
test Opendkim.lns get default_config_file =
{ "#comment" = "This is a basic configuration that can easily be adapted to suit a standard" }
{ "#comment" = "installation. For more advanced options, see opendkim.conf(5) and/or" }
{ "#comment" = "/usr/share/doc/opendkim/examples/opendkim.conf.sample." }
{ }
{ "#comment" = "Log to syslog" }
{ "Syslog" = "yes" }
{ "#comment" = "Required to use local socket with MTAs that access the socket as a non-" }
{ "#comment" = "privileged user (e.g. Postfix)" }
{ "UMask" = "002" }
{ }
{ "#comment" = "Sign for example.com with key in /etc/mail/dkim.key using" }
{ "#comment" = "selector '2007' (e.g. 2007._domainkey.example.com)" }
{ "#comment" = "Domain example.com" }
{ "#comment" = "KeyFile /etc/mail/dkim.key" }
{ "#comment" = "Selector 2007" }
{ }
{ "#comment" = "Commonly-used options; the commented-out versions show the defaults." }
{ "#comment" = "Canonicalization simple" }
{ "#comment" = "Mode sv" }
{ "#comment" = "SubDomains no" }
{ "#comment" = "ADSPAction continue" }
{ }
{ "#comment" = "Always oversign From (sign using actual From and a null From to prevent" }
{ "#comment" = "malicious signatures header fields (From and/or others) between the signer" }
{ "#comment" = "and the verifier. From is oversigned by default in the Debian package" }
{ "#comment" = "because it is often the identity key used by reputation systems and thus" }
{ "#comment" = "somewhat security sensitive." }
{ "OversignHeaders" = "From" }
{ }
{ "#comment" = "List domains to use for RFC 6541 DKIM Authorized Third-Party Signatures" }
{ "#comment" = "(ATPS) (experimental)" }
{ }
{ "#comment" = "ATPSDomains example.com" }