Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 312287 Details for
Bug 456144
Package build failed
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Updated defauls for amavisd.conf
amavisd-conf.patch (text/x-patch), 3.79 KB, created by
Miguel Di Ciurcio Filho
on 2008-07-21 18:12:07 UTC
(
hide
)
Description:
Updated defauls for amavisd.conf
Filename:
MIME Type:
Creator:
Miguel Di Ciurcio Filho
Created:
2008-07-21 18:12:07 UTC
Size:
3.79 KB
patch
obsolete
>--- amavisd.conf.orig 2008-07-21 14:33:26.000000000 -0300 >+++ amavisd.conf 2008-07-21 14:42:00.000000000 -0300 >@@ -15,15 +15,15 @@ > # $bypass_decode_parts = 1; # controls running of decoders&dearchivers > > $max_servers = 2; # num of pre-forked children (2..30 is common), -m >-$daemon_user = 'vscan'; # (no default; customary: vscan or amavis), -u >-$daemon_group = 'vscan'; # (no default; customary: vscan or amavis), -g >+$daemon_user = 'amavis'; # (no default; customary: vscan or amavis), -u >+$daemon_group = 'amavis'; # (no default; customary: vscan or amavis), -g > > $mydomain = 'example.com'; # a convenient default for other settings > >-# $MYHOME = '/var/amavis'; # a convenient default for other settings, -H >+$MYHOME = '/var/spool/amavis'; # a convenient default for other settings, -H > $TEMPBASE = "$MYHOME/tmp"; # working directory, needs to exist, -T > $ENV{TMPDIR} = $TEMPBASE; # environment variable TMPDIR, used by SA, etc. >-$QUARANTINEDIR = '/var/virusmails'; # -Q >+$QUARANTINEDIR = "$MYHOME/quarantine"; # -Q > # $quarantine_subdir_levels = 1; # add level of subdirs to disperse quarantine > # $release_format = 'resend'; # 'attach', 'plain', 'resend' > # $report_format = 'arf'; # 'attach', 'plain', 'resend', 'arf' >@@ -32,8 +32,8 @@ > > # $db_home = "$MYHOME/db"; # dir for bdb nanny/cache/snmp databases, -D > # $helpers_home = "$MYHOME/var"; # working directory for SpamAssassin, -S >-# $lock_file = "$MYHOME/var/amavisd.lock"; # -L >-# $pid_file = "$MYHOME/var/amavisd.pid"; # -P >+$lock_file = "/var/run/amavisd/amavisd.lock"; # -L >+$pid_file = "/var/run/amavisd/amavisd.pid"; # -P > #NOTE: create directories $MYHOME/tmp, $MYHOME/var, $MYHOME/db manually > > $log_level = 0; # verbosity 0..5, -d >@@ -116,11 +116,11 @@ > # $timestamp_fmt_mysql = 1; # if using MySQL *and* msgs.time_iso is TIMESTAMP; > # defaults to 0, which is good for non-MySQL or if msgs.time_iso is CHAR(16) > >-$virus_admin = "virusalert\@$mydomain"; # notifications recip. >+$virus_admin = undef; # notifications recip. > >-$mailfrom_notify_admin = "virusalert\@$mydomain"; # notifications sender >-$mailfrom_notify_recip = "virusalert\@$mydomain"; # notifications sender >-$mailfrom_notify_spamadmin = "spam.police\@$mydomain"; # notifications sender >+$mailfrom_notify_admin = undef; # notifications sender >+$mailfrom_notify_recip = undef; # notifications sender >+$mailfrom_notify_spamadmin = undef; # notifications sender > $mailfrom_to_quarantine = ''; # null return path; uses original sender if undef > > @addr_extension_virus_maps = ('virus'); >@@ -154,10 +154,10 @@ > # $notify_method = 'smtp:[127.0.0.1]:10025'; > # $forward_method = 'smtp:[127.0.0.1]:10025'; # set to undef with milter! > >-# $final_virus_destiny = D_DISCARD; >-# $final_banned_destiny = D_BOUNCE; >-# $final_spam_destiny = D_BOUNCE; >-# $final_bad_header_destiny = D_PASS; >+$final_virus_destiny = D_DISCARD; >+$final_banned_destiny = D_BOUNCE; >+$final_spam_destiny = D_DISCARD; >+$final_bad_header_destiny = D_BOUNCE; > # $bad_header_quarantine_method = undef; > > # $os_fingerprint_method = 'p0f:*:2345'; # to query p0f-analyzer.pl >@@ -360,10 +360,10 @@ > # ['Sophos SAVI', \&sophos_savi ], > > # ### http://www.clamav.net/ >-# ['ClamAV-clamd', >-# \&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd"], >-# qr/\bOK$/, qr/\bFOUND$/, >-# qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ], >+['ClamAV-clamd', >+ \&ask_daemon, ["CONTSCAN {}\n", "/var/spool/amavisd/clamd.sock"], >+ qr/\bOK$/, qr/\bFOUND$/, >+ qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ], > # # NOTE: run clamd under the same user as amavisd, or run it under its own > # # uid such as clamav, add user clamav to the amavis group, and then add > # # AllowSupplementaryGroups to clamd.conf;
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 456144
:
312286
|
312287
|
312292