On Mon, Oct 10, 2022 at 07:22:18 -0400, Wietse Venema wrote:
> To find out if you have messages flagged as "corrupt", you can
> use the "postfix check" command.
>
> Execute as root:
>
> postfix check
>
FYI, with grep 3.8, this triggers deprecation warnings on 'egrep':
$ sudo postfix check
egrep: warning: egrep is obsolescent; using grep -E
Usage of 'egrep' in postfix-script (as well as postfix-tls-script)
should be replaced with 'grep -E', patch attached.
The documentation refers to egrep/fgrep in several places as well.
Geert
--- postfix-script.orig 2022-10-10 14:44:51.000000000 +0200
+++ postfix-script 2022-10-10 17:03:24.466658356 +0200
@@ -328,7 +328,7 @@
# Check Postfix mail_owner-owned directory tree owner.
find `ls -d $queue_directory/* | \
- egrep
'/(saved|incoming|active|defer|deferred|bounce|hold|trace|corrupt|public|private|flush)$'`
\
+ grep -E
'/(saved|incoming|active|defer|deferred|bounce|hold|trace|corrupt|public|private|flush)$'`
\
! \( -type p -o -type s \) ! -user $mail_owner \
-exec $WARN not owned by $mail_owner: {} \;
--- postfix-tls-script.orig 2022-10-10 14:44:51.000000000 +0200
+++ postfix-tls-script 2022-10-10 17:03:32.139954539 +0200
@@ -333,7 +333,7 @@
}
rsa=
ecdsa=
-for _algo in `$postconf -T public-key-algorithms | egrep '^(rsa|ecdsa)$'`
+for _algo in `$postconf -T public-key-algorithms | grep -E '^(rsa|ecdsa)$'`
do
eval $_algo=$_algo
done
@@ -415,7 +415,7 @@
for cmd in ec rsa; do
$openssl $cmd -passin "pass:umask 077" -in "$1" -pubout |
$openssl $cmd -pubin -outform DER |
- hex_sha256 | egrep -v "${null256}" && return 0
+ hex_sha256 | grep -E -v "${null256}" && return 0
done 2>/dev/null
return 1
}
@@ -429,7 +429,7 @@
for cmd in ec rsa; do
$openssl x509 -pubkey -noout -in "$1" |
$openssl $cmd -pubin -outform DER |
- hex_sha256 | egrep -v "${null256}" && return 0
+ hex_sha256 | grep -E -v "${null256}" && return 0
done 2>/dev/null
return 1
}