#!/bin/bash function _escape { echo "${1//./\\.}" } # Returns input after filtering out lines that are: # empty, white-space, comments (`#` as the first non-whitespace character) function _get_valid_lines_from_file { grep --extended-regexp --invert-match "^\s*$|^\s*#" "${1}" || true } # Provide the name of an environment variable to this function # and it will return its value stored in /etc/dms-settings function _get_dms_env_value { grep "^${1}=" /etc/dms-settings | cut -d "'" -f 2 } # TODO: `chown -R 5000:5000 /var/mail` has existed since the projects first commit. # It later received a depth guard to apply the fix only when it's relevant for a dir. # Assess if this still appropriate, it appears to be problematic for some LDAP users. # # `helpers/accounts.sh:_create_accounts` (mkdir, cp) appears to be the only writer to # /var/mail folders (used during startup and change detection handling). function _chown_var_mail_if_necessary { # fix permissions, but skip this if 3 levels deep the user id is already set if find /var/mail -maxdepth 3 -a \( \! -user 5000 -o \! -group 5000 \) | read -r then _log 'trace' 'Fixing /var/mail permissions' chown -R 5000:5000 /var/mail || return 1 fi } function _require_n_parameters_or_print_usage { local COUNT COUNT=${1} shift [[ ${1:-} == 'help' ]] && { __usage ; exit 0 ; } [[ ${#} -lt ${COUNT} ]] && { __usage ; exit 1 ; } } # NOTE: Postfix commands that read `main.cf` will stall execution, # until the config file has not be written to for at least 2 seconds. # After we modify the config explicitly, we can safely assume (reasonably) # that the write stream has completed, and it is safe to read the config. # https://github.com/docker-mailserver/docker-mailserver/issues/2985 function _adjust_mtime_for_postfix_maincf { if [[ $(( $(date '+%s') - $(stat -c '%Y' '/etc/postfix/main.cf') )) -lt 2 ]] then touch -d '2 seconds ago' /etc/postfix/main.cf fi } function _reload_postfix { _adjust_mtime_for_postfix_maincf postfix reload } # Replaces values in configuration files given a set of specific environment # variables. The environment variables follow a naming pattern, whereby every # variable that is taken into account has a given prefix. The new value in the # configuration will be the one the environment variable had at the time of # calling this function. # # @option --shutdown-on-error = shutdown in case an error is detected # @param ${1} = prefix for environment variables # @param ${2} = file in which substitutions should take place # # ## Example # # If you want to set a new value for `readme_directory` in Postfix's `main.cf`, # you can set the environment variable `POSTFIX_README_DIRECTORY='/new/dir/'` # (`POSTFIX_` is an arbitrary prefix, you can choose the one you like), # and then call this function: # `_replace_by_env_in_file 'POSTFIX_' 'PATH TO POSTFIX's main.cf>` # # ## Panics # # This function will panic, i.e. shut down the whole container, if: # # 1. No first and second argument is supplied # 2. The second argument is a path to a file that does not exist function _replace_by_env_in_file { if [[ -z ${1+set} ]] then _dms_panic__invalid_value 'first argument unset' 'utils.sh:_replace_by_env_in_file' 'immediate' elif [[ -z ${2+set} ]] then _dms_panic__invalid_value 'second argument unset' 'utils.sh:_replace_by_env_in_file' 'immediate' elif [[ ! -f ${2} ]] then _dms_panic__invalid_value "file '${2}' does not exist" 'utils.sh:_replace_by_env_in_file' 'immediate' fi local ENV_PREFIX=${1} CONFIG_FILE=${2} local ESCAPED_VALUE ESCAPED_KEY while IFS='=' read -r KEY VALUE do KEY=${KEY#"${ENV_PREFIX}"} # strip prefix ESCAPED_KEY=$(sed -E 's#([\=\&\|\$\.\*\/\[\\^]|\])#\\\1#g' <<< "${KEY,,}") ESCAPED_VALUE=$(sed -E 's#([\=\&\|\$\.\*\/\[\\^]|\])#\\\1#g' <<< "${VALUE}") [[ -n ${ESCAPED_VALUE} ]] && ESCAPED_VALUE=" ${ESCAPED_VALUE}" _log 'trace' "Setting value of '${KEY}' in '${CONFIG_FILE}' to '${VALUE}'" sed -i -E "s#^${ESCAPED_KEY}[[:space:]]*=.*#${ESCAPED_KEY} =${ESCAPED_VALUE}#g" "${CONFIG_FILE}" done < <(env | grep "^${ENV_PREFIX}") }