? GR0V Shell

GR0V shell

Linux server122.web-hosting.com 4.18.0-513.18.1.lve.el8.x86_64 #1 SMP Thu Feb 22 12:55:50 UTC 2024 x86_64

Path : /opt/puppetlabs/puppet/share/augeas/lenses/dist/tests/
File Upload :
Current File : //opt/puppetlabs/puppet/share/augeas/lenses/dist/tests/test_opendkim.aug

module Test_Opendkim =

  let simple_string_value = "ADSPAction discard\n"
  test Opendkim.lns get simple_string_value =
    { "ADSPAction" = "discard" } 
  test Opendkim.lns put simple_string_value after
    set "ADSPAction" "discard" = simple_string_value 

  let simple_integer_value = "AutoRestartCount 1\n"
  test Opendkim.lns get simple_integer_value =
    { "AutoRestartCount" = "1" } 
  test Opendkim.lns put simple_integer_value after
    set "AutoRestartCount" "1" = simple_integer_value

  let simple_boolean_value = "AddAllSignatureResults true\n"
  test Opendkim.lns get simple_boolean_value =
    { "AddAllSignatureResults" = "true" } 
  test Opendkim.lns put simple_boolean_value after
    set "AddAllSignatureResults" "true" = simple_boolean_value

  let yes_boolean_value= "AddAllSignatureResults yes\n"
  test Opendkim.lns get yes_boolean_value =
    { "AddAllSignatureResults" = "yes" } 
  test Opendkim.lns put yes_boolean_value after
    set "AddAllSignatureResults" "yes" = yes_boolean_value

  let one_boolean_value= "AddAllSignatureResults 1\n"
  test Opendkim.lns get one_boolean_value =
    { "AddAllSignatureResults" = "1" } 
  test Opendkim.lns put one_boolean_value after
    set "AddAllSignatureResults" "1" = one_boolean_value

  let one_boolean_value_uppercase_yes = "AutoRestart Yes\n"
  test Opendkim.lns get one_boolean_value_uppercase_yes =
    { "AutoRestart" = "Yes" }
  test Opendkim.lns put one_boolean_value_uppercase_yes after
    set "AutoRestart" "Yes" = one_boolean_value_uppercase_yes

  let one_boolean_value_uppercase_no = "AutoRestart No\n"
  test Opendkim.lns get one_boolean_value_uppercase_no =
    { "AutoRestart" = "No" }
  test Opendkim.lns put one_boolean_value_uppercase_no after
    set "AutoRestart" "No" = one_boolean_value_uppercase_no

  let one_boolean_value_uppercase_true = "AutoRestart True\n"
  test Opendkim.lns get one_boolean_value_uppercase_true =
    { "AutoRestart" = "True" }
  test Opendkim.lns put one_boolean_value_uppercase_true after
    set "AutoRestart" "True" = one_boolean_value_uppercase_true

  let one_boolean_value_uppercase_false = "AutoRestart False\n"
  test Opendkim.lns get one_boolean_value_uppercase_false =
    { "AutoRestart" = "False" }
  test Opendkim.lns put one_boolean_value_uppercase_false after
    set "AutoRestart" "False" = one_boolean_value_uppercase_false

  let string_value_starting_with_number = "AutoRestartRate 10/1h\n"
  test Opendkim.lns get string_value_starting_with_number =
    { "AutoRestartRate" = "10/1h" }
  test Opendkim.lns put string_value_starting_with_number after
    set "AutoRestartRate" "10/1h" = string_value_starting_with_number

  let string_value_containing_slash = "TrustAnchorFile /usr/share/dns/root.key\n"
  test Opendkim.lns get string_value_containing_slash =
    { "TrustAnchorFile" = "/usr/share/dns/root.key" }
  test Opendkim.lns put string_value_containing_slash after
    set "TrustAnchorFile" "/usr/share/dns/root.key" = string_value_containing_slash

  let logwhy_keyword_boolean = "LogWhy Yes\n"
  test Opendkim.lns get logwhy_keyword_boolean =
    { "LogWhy" = "Yes" }
  test Opendkim.lns put logwhy_keyword_boolean after
    set "LogWhy" "Yes" = logwhy_keyword_boolean

  let three_type_value = "AddAllSignatureResults false\nADSPAction discard\nAutoRestartCount 2\n"
  test Opendkim.lns get three_type_value =
    { "AddAllSignatureResults" = "false" }
    { "ADSPAction" = "discard" }
    { "AutoRestartCount" = "2" } 

  test Opendkim.lns put "" after
    set "AddAllSignatureResults" "false";
    set "ADSPAction" "discard";
    set "AutoRestartCount" "2" = three_type_value

  let two_boolean_value = "AddAllSignatureResults false\nADSPNoSuchDomain true\n"
  test Opendkim.lns get two_boolean_value =
    { "AddAllSignatureResults" = "false" }
    { "ADSPNoSuchDomain" = "true" }

  test Opendkim.lns put "" after
    set "AddAllSignatureResults" "false";
    set "ADSPNoSuchDomain" "true" = two_boolean_value 

  let blank_line_between= "AddAllSignatureResults false\n\nADSPNoSuchDomain true\n"
  test Opendkim.lns get blank_line_between =
    { "AddAllSignatureResults" = "false" }
    { }
    { "ADSPNoSuchDomain" = "true" }

  test Opendkim.lns put "" after
    set "AddAllSignatureResults" "false";
    set "ADSPNoSuchDomain" "true" = "AddAllSignatureResults false\nADSPNoSuchDomain true\n" 

  let include_comment_line= "AddAllSignatureResults false\n#A comment\nADSPNoSuchDomain true\n"
  test Opendkim.lns get include_comment_line =
    { "AddAllSignatureResults" = "false" }
    { "#comment" = "A comment" }
    { "ADSPNoSuchDomain" = "true" }

  test Opendkim.lns put "" after
    set "AddAllSignatureResults" "false";
    set "#comment" "A comment";
    set "ADSPNoSuchDomain" "true" = include_comment_line  

  let default_config_file = "# This is a basic configuration that can easily be adapted to suit a standard
# installation. For more advanced options, see opendkim.conf(5) and/or
# /usr/share/doc/opendkim/examples/opendkim.conf.sample.

# Log to syslog
Syslog      yes
# Required to use local socket with MTAs that access the socket as a non-
# privileged user (e.g. Postfix)
UMask     002

# Sign for example.com with key in /etc/mail/dkim.key using
# selector '2007' (e.g. 2007._domainkey.example.com)
#Domain     example.com
#KeyFile    /etc/mail/dkim.key
#Selector   2007

# Commonly-used options; the commented-out versions show the defaults.
#Canonicalization simple
#Mode     sv
#SubDomains   no
#ADSPAction            continue

# Always oversign From (sign using actual From and a null From to prevent
# malicious signatures header fields (From and/or others) between the signer
# and the verifier.  From is oversigned by default in the Debian package
# because it is often the identity key used by reputation systems and thus
# somewhat security sensitive.
OversignHeaders   From

# List domains to use for RFC 6541 DKIM Authorized Third-Party Signatures
# (ATPS) (experimental)

#ATPSDomains    example.com
"
  test Opendkim.lns get default_config_file = 
  { "#comment" = "This is a basic configuration that can easily be adapted to suit a standard" }
  { "#comment" = "installation. For more advanced options, see opendkim.conf(5) and/or" }
  { "#comment" = "/usr/share/doc/opendkim/examples/opendkim.conf.sample." }
  {  }
  { "#comment" = "Log to syslog" }
  { "Syslog" = "yes" }
  { "#comment" = "Required to use local socket with MTAs that access the socket as a non-" }
  { "#comment" = "privileged user (e.g. Postfix)" }
  { "UMask" = "002" }
  {  }
  { "#comment" = "Sign for example.com with key in /etc/mail/dkim.key using" }
  { "#comment" = "selector '2007' (e.g. 2007._domainkey.example.com)" }
  { "#comment" = "Domain     example.com" }
  { "#comment" = "KeyFile    /etc/mail/dkim.key" }
  { "#comment" = "Selector   2007" }
  {  }
  { "#comment" = "Commonly-used options; the commented-out versions show the defaults." }
  { "#comment" = "Canonicalization simple" }
  { "#comment" = "Mode     sv" }
  { "#comment" = "SubDomains   no" }
  { "#comment" = "ADSPAction            continue" }
  {  }
  { "#comment" = "Always oversign From (sign using actual From and a null From to prevent" }
  { "#comment" = "malicious signatures header fields (From and/or others) between the signer" }
  { "#comment" = "and the verifier.  From is oversigned by default in the Debian package" }
  { "#comment" = "because it is often the identity key used by reputation systems and thus" }
  { "#comment" = "somewhat security sensitive." }
  { "OversignHeaders" = "From" }
  {  }
  { "#comment" = "List domains to use for RFC 6541 DKIM Authorized Third-Party Signatures" }
  { "#comment" = "(ATPS) (experimental)" }
  {  }
  { "#comment" = "ATPSDomains    example.com" }

T1KUS90T
  root-grov@198.54.114.191:~$