mirror of
https://github.com/mail-in-a-box/mailinabox.git
synced 2025-04-04 00:17:06 +00:00
Upstream is adding handling for utf8 domains by creating a domain alias @utf8 -> @idna. I'm deviating from this approach by setting multiple email address (idna and utf8) per user and alias where a domain contains non-ascii characters. The maildrop (mailbox) remains the same - all mail goes to the user's mailbox regardless of which email address was used. This is more in line with how other systems (eg. active directory), handle multiple email addresses for a single user. # Conflicts: # README.md # management/mailconfig.py # management/templates/index.html # setup/dns.sh # setup/mail-users.sh
273 lines
7.7 KiB
Bash
Executable File
273 lines
7.7 KiB
Bash
Executable File
|
|
#
|
|
# requires:
|
|
#
|
|
# test scripts: [ lib/misc.sh, lib/system.sh ]
|
|
#
|
|
|
|
|
|
die() {
|
|
local msg="$1"
|
|
echo "$msg" 1>&2
|
|
exit 1
|
|
}
|
|
|
|
|
|
wait_for_docker_nextcloud() {
|
|
local container="$1"
|
|
local config_key="$2"
|
|
echo -n "Waiting ..."
|
|
local count=0
|
|
while true; do
|
|
if [ $count -ge 10 ]; then
|
|
echo "FAILED"
|
|
return 1
|
|
fi
|
|
sleep 6
|
|
let count+=1
|
|
if [ $(docker exec "$container" php -n -r "include 'config/config.php'; print \$CONFIG['$config_key']?'true':'false';") == "true" ]; then
|
|
echo "ok"
|
|
break
|
|
fi
|
|
echo -n "${count}..."
|
|
done
|
|
return 0
|
|
}
|
|
|
|
|
|
dump_conf_files() {
|
|
local skip
|
|
if [ $# -eq 0 ]; then
|
|
skip="false"
|
|
else
|
|
skip="true"
|
|
for item; do
|
|
if is_true "$item"; then
|
|
skip="false"
|
|
break
|
|
fi
|
|
done
|
|
fi
|
|
if [ "$skip" == "false" ]; then
|
|
dump_file "/etc/mailinabox.conf"
|
|
dump_file_if_exists "/etc/mailinabox_mods.conf"
|
|
dump_file "/etc/hosts"
|
|
dump_file "/etc/nsswitch.conf"
|
|
dump_file "/etc/resolv.conf"
|
|
dump_file "/etc/nsd/nsd.conf"
|
|
#dump_file "/etc/postfix/main.cf"
|
|
fi
|
|
}
|
|
|
|
|
|
|
|
#
|
|
# Initialize the test system
|
|
# hostname, time, apt update/upgrade, etc
|
|
#
|
|
# Errors are fatal
|
|
#
|
|
init_test_system() {
|
|
H2 "Update /etc/hosts"
|
|
if ! set_system_hostname; then
|
|
dump_file "/etc/hosts"
|
|
die "Could not set hostname"
|
|
fi
|
|
|
|
# update system time
|
|
H2 "Set system time"
|
|
update_system_time || echo "Ignoring error..."
|
|
|
|
# update package lists before installing anything
|
|
H2 "apt-get update"
|
|
wait_for_apt
|
|
apt-get update -qq || die "apt-get update failed!"
|
|
|
|
# upgrade packages - if we don't do this and something like bind
|
|
# is upgraded through automatic upgrades (because maybe MiaB was
|
|
# previously installed), it may cause problems with the rest of
|
|
# the setup, such as with name resolution failures
|
|
if is_false "$TRAVIS" && [ "$SKIP_SYSTEM_UPDATE" != "1" ]; then
|
|
H2 "apt-get upgrade"
|
|
wait_for_apt
|
|
apt-get upgrade -qq || die "apt-get upgrade failed!"
|
|
fi
|
|
|
|
# install avahi if the system dns domain is .local - note that
|
|
# /bin/dnsdomainname returns empty string at this point
|
|
case "$PRIMARY_HOSTNAME" in
|
|
*.local )
|
|
wait_for_apt
|
|
apt-get install -y -qq avahi-daemon || die "could not install avahi"
|
|
;;
|
|
esac
|
|
}
|
|
|
|
|
|
#
|
|
# Initialize the test system with QA prerequisites
|
|
# Anything needed to use the test runner, speed up the installation,
|
|
# etc
|
|
#
|
|
init_miab_testing() {
|
|
[ -z "$STORAGE_ROOT" ] \
|
|
&& echo "Error: STORAGE_ROOT not set" 1>&2 \
|
|
&& return 1
|
|
|
|
# If EHDD_KEYFILE is set, use encryption-at-rest support. The
|
|
# drive must be created and mounted so that our QA files can be
|
|
# copied there.
|
|
H2 "Encryption-at-rest"
|
|
if [ ! -z "$EHDD_KEYFILE" ]; then
|
|
ehdd/create_hdd.sh ${EHDD_GB} || die "create luks drive failed"
|
|
ehdd/mount.sh || die "unable to mount luks drive"
|
|
else
|
|
echo "Not configured for encryption-at-rest"
|
|
fi
|
|
|
|
H2 "QA prerequisites"
|
|
local rc=0
|
|
|
|
# python3-dnspython: is used by the python scripts in 'tests' and is
|
|
# not installed by setup
|
|
# also install 'jq' for json processing
|
|
wait_for_apt
|
|
apt-get install -y -qq python3-dnspython jq
|
|
|
|
# copy in pre-built MiaB-LDAP ssl files
|
|
# 1. avoid the lengthy generation of DH params
|
|
if ! mkdir -p $STORAGE_ROOT/ssl; then
|
|
echo "Unable to create $STORAGE_ROOT/ssl ($?)"
|
|
rc=1
|
|
fi
|
|
echo "Copy dhparams"
|
|
if ! cp tests/assets/ssl/dh2048.pem $STORAGE_ROOT/ssl; then
|
|
echo "Copy failed ($?)"
|
|
rc=1
|
|
fi
|
|
|
|
if array_contains "--qa-ca" "$@"; then
|
|
echo "Copy certificate authority"
|
|
if ! cp tests/assets/ssl/ca_*.pem $STORAGE_ROOT/ssl; then
|
|
echo "Copy failed ($?)"
|
|
rc=1
|
|
fi
|
|
fi
|
|
|
|
# create miab_ldap.conf to specify what the Nextcloud LDAP service
|
|
# account password will be to avoid a random one created by start.sh
|
|
if [ ! -z "$LDAP_NEXTCLOUD_PASSWORD" ]; then
|
|
if ! mkdir -p $STORAGE_ROOT/ldap; then
|
|
echo "Could not create $STORAGE_ROOT/ldap"
|
|
rc=1
|
|
fi
|
|
[ -e $STORAGE_ROOT/ldap/miab_ldap.conf ] && \
|
|
echo "Warning: exists: $STORAGE_ROOT/ldap/miab_ldap.conf" 1>&2
|
|
touch $STORAGE_ROOT/ldap/miab_ldap.conf || rc=1
|
|
if ! grep "^LDAP_NEXTCLOUD_PASSWORD=" $STORAGE_ROOT/ldap/miab_ldap.conf >/dev/null; then
|
|
echo "LDAP_NEXTCLOUD_PASSWORD=\"$LDAP_NEXTCLOUD_PASSWORD\"" >> $STORAGE_ROOT/ldap/miab_ldap.conf
|
|
fi
|
|
fi
|
|
|
|
# now that we've copied our files, unmount STORAGE_ROOT if
|
|
# encryption-at-rest was enabled
|
|
ehdd/umount.sh
|
|
|
|
return $rc
|
|
}
|
|
|
|
|
|
enable_miab_mod() {
|
|
local name="${1}.sh"
|
|
if [ ! -e "$LOCAL_MODS_DIR/$name" ]; then
|
|
mkdir -p "$LOCAL_MODS_DIR"
|
|
if ! ln -s "$(pwd)/setup/mods.available/$name" "$LOCAL_MODS_DIR/$name"
|
|
then
|
|
echo "Warning: copying instead of symlinking $LOCAL_MODS_DIR/$name"
|
|
cp "setup/mods.available/$name" "$LOCAL_MODS_DIR/$name"
|
|
fi
|
|
fi
|
|
}
|
|
|
|
disable_miab_mod() {
|
|
local name="${1}.sh"
|
|
rm -f "$LOCAL_MODS_DIR/$name"
|
|
}
|
|
|
|
|
|
tag_from_readme() {
|
|
# extract the recommended TAG from README.md
|
|
# sets a global "TAG"
|
|
local readme="${1:-README.md}"
|
|
TAG="$(grep -F 'git checkout' "$readme" | sed 's/.*\(v[0123456789]*\.[0123456789]*\).*/\1/')"
|
|
[ $? -ne 0 -o -z "$TAG" ] && return 1
|
|
return 0
|
|
}
|
|
|
|
|
|
workaround_dovecot_sieve_bug() {
|
|
# Workaround a bug in dovecot/sieve that causes attempted sieve
|
|
# compilation when a compiled sieve has the same date as the
|
|
# source file. The fialure occurs with miab-installed "spam"
|
|
# sieve, which can't be recompiled due to the read-only /etc
|
|
# filesystem restriction in systemd (ProtectSystem=efull is set,
|
|
# see `systemctl cat dovecot.service`).
|
|
sleep 1
|
|
touch /etc/dovecot/sieve-spam.svbin
|
|
}
|
|
|
|
|
|
miab_ldap_install() {
|
|
H1 "MIAB-LDAP INSTALL"
|
|
# ensure we're in a MiaB-LDAP working directory
|
|
if [ ! -e setup/ldap.sh ]; then
|
|
die "Cannot install: the working directory is not MiaB-LDAP!"
|
|
fi
|
|
|
|
# setup/questions.sh installs the email_validator python3 module
|
|
# but only when in interactive mode. make sure it's also installed
|
|
# in non-interactive mode
|
|
if [ ! -z "${NONINTERACTIVE:-}" ]; then
|
|
H2 "Install email_validator python3 module"
|
|
pip3 install -q "email_validator>=1.0.0" || die "Unable to install email_validator python3 module!"
|
|
fi
|
|
|
|
# if EHDD_KEYFILE is set, use encryption-at-rest support
|
|
if [ ! -z "$EHDD_KEYFILE" ]; then
|
|
ehdd/start-encrypted.sh
|
|
else
|
|
setup/start.sh
|
|
fi
|
|
|
|
if [ $? -ne 0 ]; then
|
|
H1 "OUTPUT OF SELECT FILES"
|
|
dump_file "/var/log/syslog" 100
|
|
dump_conf_files "$TRAVIS"
|
|
H2; H2 "End"; H2
|
|
die "MiaB-LDAP setup failed!"
|
|
fi
|
|
|
|
workaround_dovecot_sieve_bug
|
|
|
|
# set actual STORAGE_ROOT, STORAGE_USER, PRIVATE_IP, etc
|
|
. /etc/mailinabox.conf || die "Could not source /etc/mailinabox.conf"
|
|
|
|
# setup changes the hostname so avahi must be restarted
|
|
if systemctl is-active --quiet avahi-daemon; then
|
|
systemctl restart avahi-daemon
|
|
fi
|
|
}
|
|
|
|
|
|
populate_by_name() {
|
|
local populate_name
|
|
for populate_name; do
|
|
H1 "Populate Mail-in-a-Box ($populate_name)"
|
|
local populate_script="tests/system-setup/populate/${populate_name}-populate.sh"
|
|
if [ ! -e "$populate_script" ]; then
|
|
die "Does not exist: $populate_script"
|
|
fi
|
|
"$populate_script" || die "Failed: $populate_script"
|
|
done
|
|
}
|