chore: fix various typos across codebase (#4552)
Some checks failed
Lint / lint (push) Waiting to run
Build, Test & Deploy / Build AMD64 Image (push) Has been cancelled
Documentation / Deploy Docs (push) Has been cancelled
Build, Test & Deploy / Test AMD64 Image (push) Has been cancelled
Build, Test & Deploy / Publish AMD64 and ARM64 Image (push) Has been cancelled
Documentation / Update `versions.json` if necessary (push) Has been cancelled
Documentation / update `latest` symlink if necessary (push) Has been cancelled

Co-authored-by: Georg Lauterbach <44545919+georglauterbach@users.noreply.github.com>
This commit is contained in:
Jam Balaya 2025-08-13 06:55:53 +09:00 committed by GitHub
parent 060bf9a474
commit c1a5eabc94
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
29 changed files with 37 additions and 36 deletions

View file

@ -20,7 +20,7 @@ body:
id: context id: context
attributes: attributes:
label: Context label: Context
description: Tell us how your request is related to DMS, one of its components or another issue / PR. Also **link all conected issues and PRs here**! description: Tell us how your request is related to DMS, one of its components or another issue / PR. Also **link all connected issues and PRs here**!
validations: validations:
required: true required: true
- type: textarea - type: textarea

View file

@ -109,7 +109,7 @@ jobs:
update-latest-symlink: update-latest-symlink:
permissions: permissions:
contents: write contents: write
name: 'update `latest` symlink if neccessary' name: 'update `latest` symlink if necessary'
runs-on: ubuntu-22.04 runs-on: ubuntu-22.04
if: startsWith(github.ref, 'refs/tags/') if: startsWith(github.ref, 'refs/tags/')
needs: add-version-to-docs needs: add-version-to-docs

View file

@ -29,6 +29,7 @@ All notable changes to this project will be documented in this file. The format
- **Internal:** - **Internal:**
- The DMS _Config Volume_ (`/tmp/docker-mailserver`) will now ensure it's file tree is accessible for services when the volume was created with missing executable bit ([#4487](https://github.com/docker-mailserver/docker-mailserver/pull/4487)) - The DMS _Config Volume_ (`/tmp/docker-mailserver`) will now ensure it's file tree is accessible for services when the volume was created with missing executable bit ([#4487](https://github.com/docker-mailserver/docker-mailserver/pull/4487))
- Removed the build-time hostname workaround for Postfix as Debian has since patched their post-install script ([#4493](https://github.com/docker-mailserver/docker-mailserver/pull/4493)) - Removed the build-time hostname workaround for Postfix as Debian has since patched their post-install script ([#4493](https://github.com/docker-mailserver/docker-mailserver/pull/4493))
- Fixed various typos across codebase ([#4552](https://github.com/docker-mailserver/docker-mailserver/pull/4552))
### Updates ### Updates
@ -161,7 +162,7 @@ The most noteworthy change of this release is the update of the container's base
- Removed custom installations of Fail2Ban, getmail6 and Rspamd - Removed custom installations of Fail2Ban, getmail6 and Rspamd
- Updated packages lists and added comments for maintainability - Updated packages lists and added comments for maintainability
- OpenDMARC upgrade: `v1.4.0` => `v1.4.2` ([#3841](https://github.com/docker-mailserver/docker-mailserver/pull/3841)) - OpenDMARC upgrade: `v1.4.0` => `v1.4.2` ([#3841](https://github.com/docker-mailserver/docker-mailserver/pull/3841))
- Previous versions of OpenDMARC would place incoming mail from domains announcing `p=quarantaine` (_that fail the DMARC check_) into the [Postfix "hold" queue](https://www.postfix.org/QSHAPE_README.html#hold_queue) until administrative intervention. - Previous versions of OpenDMARC would place incoming mail from domains announcing `p=quarantine` (_that fail the DMARC check_) into the [Postfix "hold" queue](https://www.postfix.org/QSHAPE_README.html#hold_queue) until administrative intervention.
- [OpenDMARC v1.4.2 has disabled that feature by default](https://github.com/trusteddomainproject/OpenDMARC/issues/105), but it can be enabled again by adding the setting `HoldQuarantinedMessages true` to [`/etc/opendmarc.conf`](https://github.com/docker-mailserver/docker-mailserver/blob/v13.3.1/target/opendmarc/opendmarc.conf) (_provided from DMS_). - [OpenDMARC v1.4.2 has disabled that feature by default](https://github.com/trusteddomainproject/OpenDMARC/issues/105), but it can be enabled again by adding the setting `HoldQuarantinedMessages true` to [`/etc/opendmarc.conf`](https://github.com/docker-mailserver/docker-mailserver/blob/v13.3.1/target/opendmarc/opendmarc.conf) (_provided from DMS_).
- [Our `user-patches.sh` feature](https://docker-mailserver.github.io/docker-mailserver/latest/config/advanced/override-defaults/user-patches/) provides a convenient approach to updating that config file. - [Our `user-patches.sh` feature](https://docker-mailserver.github.io/docker-mailserver/latest/config/advanced/override-defaults/user-patches/) provides a convenient approach to updating that config file.
- Please let us know if you disagree with the upstream default being carried with DMS, or the value of providing alternative configuration support within DMS. - Please let us know if you disagree with the upstream default being carried with DMS, or the value of providing alternative configuration support within DMS.
@ -336,11 +337,11 @@ DMS is now secured against the [recently published spoofing attack "SMTP Smuggli
- The test suite now uses `swaks` instead of `nc`, which has multiple benefits ([#3732](https://github.com/docker-mailserver/docker-mailserver/pull/3732)): - The test suite now uses `swaks` instead of `nc`, which has multiple benefits ([#3732](https://github.com/docker-mailserver/docker-mailserver/pull/3732)):
- `swaks` handles pipelining correctly, hence we can now use `reject_unauth_pipelining` in Postfix's configuration. - `swaks` handles pipelining correctly, hence we can now use `reject_unauth_pipelining` in Postfix's configuration.
- `swaks` provides better CLI options that make many files superflous. - `swaks` provides better CLI options that make many files superfluous.
- `swaks` can also replace `openssl s_client` and handles authentication on submission ports better. - `swaks` can also replace `openssl s_client` and handles authentication on submission ports better.
- **Postfix:** - **Postfix:**
- We now defer rejection from unauthorized pipelining until the SMTP `DATA` command via `smtpd_data_restrictions` (_i.e. at the end of the mail transfer transaction_) ([#3744](https://github.com/docker-mailserver/docker-mailserver/pull/3744)) - We now defer rejection from unauthorized pipelining until the SMTP `DATA` command via `smtpd_data_restrictions` (_i.e. at the end of the mail transfer transaction_) ([#3744](https://github.com/docker-mailserver/docker-mailserver/pull/3744))
- Prevously our configuration only handled this during the client and recipient restriction stages. Postfix will flag this activity when encountered, but the rejection now is handled at `DATA` where unauthorized pipelining would have been valid from this point. - Previously our configuration only handled this during the client and recipient restriction stages. Postfix will flag this activity when encountered, but the rejection now is handled at `DATA` where unauthorized pipelining would have been valid from this point.
- If you had the Amavis service enabled (default), this restriction was already in place. Otherwise the concerns expressed with `smtpd_data_restrictions = reject_unauth_pipelining` from the security section above apply. We have permitted trusted clients (_`$mynetworks` or authenticated_) to bypass this restriction. - If you had the Amavis service enabled (default), this restriction was already in place. Otherwise the concerns expressed with `smtpd_data_restrictions = reject_unauth_pipelining` from the security section above apply. We have permitted trusted clients (_`$mynetworks` or authenticated_) to bypass this restriction.
## [v13.1.0](https://github.com/docker-mailserver/docker-mailserver/releases/tag/v13.1.0) ## [v13.1.0](https://github.com/docker-mailserver/docker-mailserver/releases/tag/v13.1.0)
@ -571,7 +572,7 @@ Notable changes are:
- Rspamd feature is promoted from preview status - Rspamd feature is promoted from preview status
- Services no longer use `chroot` - Services no longer use `chroot`
- Fail2Ban major version upgrade - Fail2Ban major version upgrade
- ARMv7 platform is no longer suppoted - ARMv7 platform is no longer supported
- TLS 1.2 is the minimum supported protocol - TLS 1.2 is the minimum supported protocol
- SMTP authentication on port 25 disabled - SMTP authentication on port 25 disabled
- The value of `smtpd_sender_restrictions` for Postfix has replaced the value ([#3127](https://github.com/docker-mailserver/docker-mailserver/pull/3127)): - The value of `smtpd_sender_restrictions` for Postfix has replaced the value ([#3127](https://github.com/docker-mailserver/docker-mailserver/pull/3127)):

View file

@ -107,7 +107,7 @@ configs:
# - Use an ECDSA cert that's been signed by a self-signed CA for TLS cert verification. # - Use an ECDSA cert that's been signed by a self-signed CA for TLS cert verification.
# - This cert is only valid for mail.example.test, mail.destination.test, smtp.relay-service.test # - This cert is only valid for mail.example.test, mail.destination.test, smtp.relay-service.test
# `swaks` run in the container will need to reference this CA cert file for successful verficiation (optional). # `swaks` run in the container will need to reference this CA cert file for successful verification (optional).
tls-ca-cert: tls-ca-cert:
content: | content: |
-----BEGIN CERTIFICATE----- -----BEGIN CERTIFICATE-----

View file

@ -142,7 +142,7 @@ This page provides a technical reference for account management in DMS.
- A subaddress has a tag delimiter (_default: `+`_), followed by the tag: `<local-part>+<tag>@<domain-part>` - A subaddress has a tag delimiter (_default: `+`_), followed by the tag: `<local-part>+<tag>@<domain-part>`
- The subaddress `user+github@example.com` would deliver mail to the same mailbox as `user@example.com`. - The subaddress `user+github@example.com` would deliver mail to the same mailbox as `user@example.com`.
- Tags are dynamic. Anything between the `+` and `@` is understood as the tag, no additional configuration required. - Tags are dynamic. Anything between the `+` and `@` is understood as the tag, no additional configuration required.
- Only the first occurence of the tag delimiter is recognized. Any additional occurences become part of the tag value itself. - Only the first occurrence of the tag delimiter is recognized. Any additional occurrences become part of the tag value itself.
??? tip "When is subaddressing useful?" ??? tip "When is subaddressing useful?"

View file

@ -35,7 +35,7 @@ While indexing is memory intensive, you can configure the plugin to limit the am
# disable indexing of folders # disable indexing of folders
# fts_autoindex_exclude = \Trash # fts_autoindex_exclude = \Trash
# Index attachements # Index attachments
# fts_decoder = decode2text # fts_decoder = decode2text
} }

View file

@ -733,7 +733,7 @@ Controls the spam score threshold for triggering an action on mail that has a hi
- **1** => will activate SpamAssassin short circuiting for bayes spam detection. - **1** => will activate SpamAssassin short circuiting for bayes spam detection.
This will uncomment the respective line in `/etc/spamassasin/local.cf` This will uncomment the respective line in `/etc/spamassassin/local.cf`
!!! warning !!! warning
@ -743,7 +743,7 @@ This will uncomment the respective line in `/etc/spamassasin/local.cf`
- **1** => will activate SpamAssassin short circuiting for bayes ham detection - **1** => will activate SpamAssassin short circuiting for bayes ham detection
This will uncomment the respective line in `/etc/spamassasin/local.cf` This will uncomment the respective line in `/etc/spamassassin/local.cf`
!!! warning !!! warning

View file

@ -37,7 +37,7 @@ Enabling Fail2Ban support can be done via ENV, but also requires granting at lea
--env ENABLE_FAIL2BAN=1 --env ENABLE_FAIL2BAN=1
``` ```
!!! warning "Security risk of adding non-default capabilties" !!! warning "Security risk of adding non-default capabilities"
DMS bundles F2B into the image for convenience to simplify integration and deployment. DMS bundles F2B into the image for convenience to simplify integration and deployment.

View file

@ -374,7 +374,7 @@ DMS does not manage those concerns, verify they are not causing your delivery pr
- [mail-tester](https://www.mail-tester.com/) can test your deliverability. - [mail-tester](https://www.mail-tester.com/) can test your deliverability.
- [helloinbox](https://www.helloinbox.email/) provides a checklist of things to improve your deliverability. - [helloinbox](https://www.helloinbox.email/) provides a checklist of things to improve your deliverability.
### SpamAssasin ### SpamAssassin
#### How can I manage my custom SpamAssassin rules? #### How can I manage my custom SpamAssassin rules?

View file

@ -73,7 +73,7 @@ function _bytes_to_human_readable_size() {
echo '~' echo '~'
# Otherwise a value in KibiBytes (1024 bytes == 1k) is expected (Dovecots internal representation): # Otherwise a value in KibiBytes (1024 bytes == 1k) is expected (Dovecots internal representation):
elif [[ ${1:-} =~ ^[0-9]+$ ]]; then elif [[ ${1:-} =~ ^[0-9]+$ ]]; then
# kibibytes to bytes, converted to approproate IEC unit (eg: MiB): # kibibytes to bytes, converted to appropriate IEC unit (eg: MiB):
echo $(( 1024 * ${1} )) | numfmt --to=iec echo $(( 1024 * ${1} )) | numfmt --to=iec
else else
_exit_with_error "Supplied non-number argument '${1:-}' to '_bytes_to_human_readable_size()'" _exit_with_error "Supplied non-number argument '${1:-}' to '_bytes_to_human_readable_size()'"

View file

@ -256,7 +256,7 @@ EOF
cp "${DEFAULT_CONFIG_FILE}" "${RSPAMD_OVERRIDE_D}/dkim_signing.conf" cp "${DEFAULT_CONFIG_FILE}" "${RSPAMD_OVERRIDE_D}/dkim_signing.conf"
chown _rspamd:_rspamd "${DEFAULT_CONFIG_FILE}" "${RSPAMD_OVERRIDE_D}/dkim_signing.conf" chown _rspamd:_rspamd "${DEFAULT_CONFIG_FILE}" "${RSPAMD_OVERRIDE_D}/dkim_signing.conf"
_log 'debug' 'Restarting Rspamd as initial DKIM configuration was suppplied' _log 'debug' 'Restarting Rspamd as initial DKIM configuration was supplied'
supervisorctl restart rspamd supervisorctl restart rspamd
fi fi
} }

View file

@ -74,7 +74,7 @@ ${ORANGE}EXAMPLES${RESET}
to input a password afterwards since no password was supplied. to input a password afterwards since no password was supplied.
${LWHITE}setup config dkim keysize 2048 domain 'example.com,not-example.com'${RESET} ${LWHITE}setup config dkim keysize 2048 domain 'example.com,not-example.com'${RESET}
Creates keys of length 2048 for the domains in comma-seperated list. Creates keys of length 2048 for the domains in comma-separated list.
This is necessary when using LDAP as the required domains cannot be inferred. This is necessary when using LDAP as the required domains cannot be inferred.
${LWHITE}setup config dkim help${RESET} ${LWHITE}setup config dkim help${RESET}

View file

@ -83,7 +83,7 @@ function _install_packages() {
local ANTI_VIRUS_SPAM_PACKAGES=( local ANTI_VIRUS_SPAM_PACKAGES=(
clamav clamav-daemon clamav clamav-daemon
# spamassassin is used only with amavisd-new, while pyzor + razor are used by spamassasin # spamassassin is used only with amavisd-new, while pyzor + razor are used by spamassassin
amavisd-new spamassassin pyzor razor amavisd-new spamassassin pyzor razor
) )

View file

@ -56,7 +56,7 @@ function _manage_accounts_dovecotmaster_delete { _manage_accounts 'delete' "${DA
# #
# These validation helpers rely on: # These validation helpers rely on:
# - Exteral vars to be declared prior to calling them (MAIL_ACCOUNT, PASSWD, DATABASE). # - External vars to be declared prior to calling them (MAIL_ACCOUNT, PASSWD, DATABASE).
# - Calling external method '__usage' as part of error handling. # - Calling external method '__usage' as part of error handling.
# Also used by setquota, delquota # Also used by setquota, delquota

View file

@ -7,7 +7,7 @@ function _get_label_count() {
} }
# Sets HOSTNAME and DOMAINNAME globals used throughout the scripts, # Sets HOSTNAME and DOMAINNAME globals used throughout the scripts,
# and any subprocesses called that intereact with it. # and any subprocesses called that interact with it.
function _obtain_hostname_and_domainname() { function _obtain_hostname_and_domainname() {
# Normally this value would match the output of `hostname` which mirrors `/proc/sys/kernel/hostname`, # Normally this value would match the output of `hostname` which mirrors `/proc/sys/kernel/hostname`,
# However for legacy reasons, the system ENV `HOSTNAME` was replaced here with `hostname -f` instead. # However for legacy reasons, the system ENV `HOSTNAME` was replaced here with `hostname -f` instead.

View file

@ -93,7 +93,7 @@ function _trap_err_signal() {
# shellcheck disable=SC2317 # shellcheck disable=SC2317
function __log_unexpected_error() { function __log_unexpected_error() {
local MESSAGE="Unexpected error occured :: script = ${SCRIPT:-${0}} " local MESSAGE="Unexpected error occurred :: script = ${SCRIPT:-${0}} "
MESSAGE+=" | function = ${1:-none (global)}" MESSAGE+=" | function = ${1:-none (global)}"
MESSAGE+=" | command = ${2:-?}" MESSAGE+=" | command = ${2:-?}"
MESSAGE+=" | line = ${3:-?}" MESSAGE+=" | line = ${3:-?}"

View file

@ -8,7 +8,7 @@ function _setup_dhparam() {
_log 'debug' "Setting up ${DH_SERVICE} dhparam" _log 'debug' "Setting up ${DH_SERVICE} dhparam"
if [[ -f ${DH_CUSTOM} ]]; then # use custom supplied dh params (assumes they're probably insecure) if [[ -f ${DH_CUSTOM} ]]; then # use custom supplied dh params (assumes they're probably insecure)
_log 'trace' "${DH_SERVICE} will use custom provided DH paramters" _log 'trace' "${DH_SERVICE} will use custom provided DH parameters"
_log 'warn' "Using self-generated dhparams is considered insecure - unless you know what you are doing, please remove '${DH_CUSTOM}'" _log 'warn' "Using self-generated dhparams is considered insecure - unless you know what you are doing, please remove '${DH_CUSTOM}'"
cp -f "${DH_CUSTOM}" "${DH_DEST}" cp -f "${DH_CUSTOM}" "${DH_DEST}"

View file

@ -9,7 +9,7 @@ function _register_setup_function() {
function _setup() { function _setup() {
# Requires `shopt -s globstar` because of `**` which in # Requires `shopt -s globstar` because of `**` which in
# turn is required as we're decending through directories # turn is required as we're descending through directories
for FILE in /usr/local/bin/setup.d/**/*.sh; do for FILE in /usr/local/bin/setup.d/**/*.sh; do
# shellcheck source=/dev/null # shellcheck source=/dev/null
source "${FILE}" source "${FILE}"

View file

@ -227,7 +227,7 @@ function __rspamd__setup_learning() {
sedfile -i -E '/^}/d' /etc/dovecot/conf.d/90-sieve.conf sedfile -i -E '/^}/d' /etc/dovecot/conf.d/90-sieve.conf
cat >>/etc/dovecot/conf.d/90-sieve.conf << EOF cat >>/etc/dovecot/conf.d/90-sieve.conf << EOF
# From anyhwere to Junk # From anywhere to Junk
imapsieve_mailbox1_name = Junk imapsieve_mailbox1_name = Junk
imapsieve_mailbox1_causes = COPY imapsieve_mailbox1_causes = COPY
imapsieve_mailbox1_before = file:${SIEVE_PIPE_BIN_DIR}/learn-spam.sieve imapsieve_mailbox1_before = file:${SIEVE_PIPE_BIN_DIR}/learn-spam.sieve

View file

@ -30,7 +30,7 @@ function _wait_until_expected_count_is_matched() {
} }
# WARNING: Keep in mind it is a '>=' comparison. # WARNING: Keep in mind it is a '>=' comparison.
# If you provide an explict count to match, ensure it is not too low to cause a false-positive. # If you provide an explicit count to match, ensure it is not too low to cause a false-positive.
function __has_expected_count() { function __has_expected_count() {
# shellcheck disable=SC2317 # shellcheck disable=SC2317
[[ $(__get_count) -ge "${EXPECTED_COUNT}" ]] [[ $(__get_count) -ge "${EXPECTED_COUNT}" ]]

View file

@ -15,7 +15,7 @@ load "${REPOSITORY_ROOT}/test/helper/common"
# For certs actually provisioned from LetsEncrypt the Root CA cert should not need to be provided, # For certs actually provisioned from LetsEncrypt the Root CA cert should not need to be provided,
# as it would already be available by default in `/etc/ssl/certs`, requiring only the cert chain (fullchain.pem). # as it would already be available by default in `/etc/ssl/certs`, requiring only the cert chain (fullchain.pem).
function _should_succesfully_negotiate_tls() { function _should_successfully_negotiate_tls() {
local FQDN=${1} local FQDN=${1}
# shellcheck disable=SC2031 # shellcheck disable=SC2031
local CA_CERT=${2:-${TEST_CA_CERT}} local CA_CERT=${2:-${TEST_CA_CERT}}

View file

@ -2,7 +2,7 @@ load "${REPOSITORY_ROOT}/test/helper/setup"
load "${REPOSITORY_ROOT}/test/helper/common" load "${REPOSITORY_ROOT}/test/helper/common"
BATS_TEST_NAME_PREFIX='[ClamAV + SA] (disabled) ' BATS_TEST_NAME_PREFIX='[ClamAV + SA] (disabled) '
CONTAINER_NAME='dms-test_clamav-spamassasin_disabled' CONTAINER_NAME='dms-test_clamav-spamassassin_disabled'
function setup_file() { function setup_file() {
_init_with_defaults _init_with_defaults

View file

@ -194,7 +194,7 @@ function __create_key() {
local KEYSIZE=${4:-2048} local KEYSIZE=${4:-2048}
local FORCE=${5:-} local FORCE=${5:-}
# Not quoting is intended here as we would othewise provide # Not quoting is intended here as we would otherwise provide
# the argument "''" (empty string), which would cause errors # the argument "''" (empty string), which would cause errors
# shellcheck disable=SC2086 # shellcheck disable=SC2086
_run_in_container setup config dkim ${FORCE} \ _run_in_container setup config dkim ${FORCE} \

View file

@ -45,7 +45,7 @@ function _initial_setup() {
# Test that certificate files exist for the configured `hostname`: # Test that certificate files exist for the configured `hostname`:
_should_have_valid_config "${TARGET_DOMAIN}" 'privkey.pem' 'fullchain.pem' _should_have_valid_config "${TARGET_DOMAIN}" 'privkey.pem' 'fullchain.pem'
_should_succesfully_negotiate_tls "${TARGET_DOMAIN}" _should_successfully_negotiate_tls "${TARGET_DOMAIN}"
_should_not_support_fqdn_in_cert 'example.test' _should_not_support_fqdn_in_cert 'example.test'
} }
@ -65,7 +65,7 @@ function _initial_setup() {
#test domain has certificate files #test domain has certificate files
_should_have_valid_config "${TARGET_DOMAIN}" 'privkey.pem' 'fullchain.pem' _should_have_valid_config "${TARGET_DOMAIN}" 'privkey.pem' 'fullchain.pem'
_should_succesfully_negotiate_tls "${TARGET_DOMAIN}" _should_successfully_negotiate_tls "${TARGET_DOMAIN}"
_should_not_support_fqdn_in_cert 'mail.example.test' _should_not_support_fqdn_in_cert 'mail.example.test'
} }
@ -148,7 +148,7 @@ function _initial_setup() {
# The difference in support is: # The difference in support is:
# - `example.test` should no longer be valid. # - `example.test` should no longer be valid.
# - `mail.example.test` should remain valid, but also allow any other subdomain/hostname. # - `mail.example.test` should remain valid, but also allow any other subdomain/hostname.
_should_succesfully_negotiate_tls 'mail.example.test' _should_successfully_negotiate_tls 'mail.example.test'
_should_support_fqdn_in_cert 'fake.example.test' _should_support_fqdn_in_cert 'fake.example.test'
_should_not_support_fqdn_in_cert 'example.test' _should_not_support_fqdn_in_cert 'example.test'
} }

View file

@ -198,7 +198,7 @@ function get_cipherlist() {
local TLS_VERSION=$1 local TLS_VERSION=$1
if [[ ${TLS_VERSION} == "TLSv1_3" ]]; then if [[ ${TLS_VERSION} == "TLSv1_3" ]]; then
# TLS v1.3 cipher suites are not user defineable and not unique to the available certificate(s). # TLS v1.3 cipher suites are not user definable and not unique to the available certificate(s).
# They do not support server enforced order either. # They do not support server enforced order either.
echo '"TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_AES_128_GCM_SHA256"' echo '"TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_AES_128_GCM_SHA256"'
else else

View file

@ -159,7 +159,7 @@ function _should_restart_when_killed() {
# Should kill the process successfully: # Should kill the process successfully:
# (which should then get restarted by supervisord) # (which should then get restarted by supervisord)
# NOTE: The process name from `pkill --echo` does not always match the equivalent processs name from `pgrep --list-full`. # NOTE: The process name from `pkill --echo` does not always match the equivalent process name from `pgrep --list-full`.
# The oldest process returned (if multiple) should be the top-level process launched by supervisord, # The oldest process returned (if multiple) should be the top-level process launched by supervisord,
# the PID will verify the target process was killed correctly: # the PID will verify the target process was killed correctly:
local PID=$(_exec_in_container pgrep --full --oldest "${PROCESS}") local PID=$(_exec_in_container pgrep --full --oldest "${PROCESS}")

View file

@ -117,7 +117,7 @@ function teardown_file() { _default_teardown ; }
assert_success assert_success
# NOTE: Sometimes the directory still exists, possibly from change detection # NOTE: Sometimes the directory still exists, possibly from change detection
# of the previous test (`email udpate`) triggering. Therefore, the function # of the previous test (`email update`) triggering. Therefore, the function
# `wait_until_change_detection_event_completes was added to the # `wait_until_change_detection_event_completes was added to the
# `setup.sh email update` test. # `setup.sh email update` test.
_repeat_in_container_until_success_or_timeout 60 "${CONTAINER_NAME}" bash -c '[[ ! -d /var/mail/example.com/user ]]' _repeat_in_container_until_success_or_timeout 60 "${CONTAINER_NAME}" bash -c '[[ ! -d /var/mail/example.com/user ]]'

View file

@ -122,7 +122,7 @@ function setup_file() {
# Extra ENV needed to support specific test-cases: # Extra ENV needed to support specific test-cases:
local ENV_SUPPORT=( local ENV_SUPPORT=(
# Required for openssl commands to be successul: # Required for openssl commands to be successful:
# NOTE: snakeoil cert is created (for `docker-mailserver.invalid`) via Debian post-install script for Postfix package. # NOTE: snakeoil cert is created (for `docker-mailserver.invalid`) via Debian post-install script for Postfix package.
# TODO: Use proper TLS cert # TODO: Use proper TLS cert
--env SSL_TYPE='snakeoil' --env SSL_TYPE='snakeoil'
@ -404,7 +404,7 @@ function _should_exist_in_ldap_tables() {
# Each LDAP config file sets `query_filter` to lookup a key in LDAP (values defined in `.ldif` test files) # Each LDAP config file sets `query_filter` to lookup a key in LDAP (values defined in `.ldif` test files)
# `mail` (ldap-users), `mailAlias` (ldap-aliases), `mailGroupMember` (ldap-groups) # `mail` (ldap-users), `mailAlias` (ldap-aliases), `mailGroupMember` (ldap-groups)
# `postmap` is queried with the mail account address, and the LDAP service should respond with # `postmap` is queried with the mail account address, and the LDAP service should respond with
# `result_attribute` which is the LDAP `mail` value (should match what we'r'e quering `postmap` with) # `result_attribute` which is the LDAP `mail` value (should match what we'r'e querying `postmap` with)
_run_in_container postmap -q "${MAIL_ACCOUNT}" ldap:/etc/postfix/ldap-users.cf _run_in_container postmap -q "${MAIL_ACCOUNT}" ldap:/etc/postfix/ldap-users.cf
assert_success assert_success

View file

@ -68,7 +68,7 @@ function setup() {
assert_output 'foo bar' assert_output 'foo bar'
} }
@test 'checking sedfile substitude failure (strict)' { @test 'checking sedfile substitute failure (strict)' {
# try to change 'baz' to 'something' and fail # try to change 'baz' to 'something' and fail
_run_in_container sedfile --strict -i 's|baz|something|' "${TEST_FILE}" _run_in_container sedfile --strict -i 's|baz|something|' "${TEST_FILE}"
assert_failure assert_failure