diff --git a/src/authres.rs b/src/authres.rs index 30c3d6838..23324c75a 100644 --- a/src/authres.rs +++ b/src/authres.rs @@ -181,9 +181,6 @@ fn parse_one_authres_header(header_value: &str, from_domain: &str) -> DkimResult /// is empty, we assume that the authserv-id has changed and start over with the /// new authserv-ids. /// -/// TODO this is only half of the algorithm we thought of; we also wanted to save how -/// sure we are about the authserv id. Like, a same-domain email is more trustworthy. -/// /// See [`handle_authres`]. async fn update_authservid_candidates( context: &Context, diff --git a/src/mimeparser.rs b/src/mimeparser.rs index 0a32f77da..3f5deafd5 100644 --- a/src/mimeparser.rs +++ b/src/mimeparser.rs @@ -372,7 +372,7 @@ impl MimeMessage { if !decryption_info.dkim_results.allow_keychange { for part in parser.parts.iter_mut() { - part.error = Some("Seems like DKIM failed, this either is an attack or (more likely) a bug in Authentication-Results-checking. Please tell us about this at https://support.delta.chat.\n\nScan the sender's QR code to make this work again.".to_string()); + part.error = Some("Seems like DKIM failed, this either is an attack or (more likely) a bug in Authentication-Results checking. Please tell us about this at https://support.delta.chat.".to_string()); } } if warn_empty_signature && parser.signatures.is_empty() { diff --git a/src/test_utils.rs b/src/test_utils.rs index b3699be95..8f994e1b6 100644 --- a/src/test_utils.rs +++ b/src/test_utils.rs @@ -74,6 +74,7 @@ impl TestContextManager { .await } + /// Creates a new unconfigured test account. pub async fn unconfigured(&mut self) -> TestContext { TestContext::builder() .with_log_sink(self.log_tx.clone())