Sisyphus repository
Last update: 1 october 2023 | SRPMs: 18631 | Visits: 37849716
en ru br
ALT Linux repos
S:2.3.21-alt1
D:1.1-alt0.hg20070530
5.0: 1.1.6-alt2
4.1: 1.0.13-alt1
4.0: 1.0.3.hg20070801-alt1
+updates:1.0.3.hg20070801-alt1
3.0: 0.99.14-alt2

Other repositories
Upstream:1.0.13

Group :: System/Servers
RPM: dovecot

 Main   Changelog   Spec   Patches   Sources   Download   Gear   Bugs and FR  Repocop 

Patch: dovecot-1.0.13-alt-conf.patch
Download


diff -Naur dovecot-1.0.13/dovecot-example.conf.orig dovecot-1.0.13/dovecot-example.conf
--- dovecot-1.0.13/dovecot-example.conf.orig	2008-03-13 03:47:50 -0400
+++ dovecot-1.0.13/dovecot-example.conf	2008-03-13 03:59:04 -0400
@@ -13,14 +13,14 @@
 # any of the lines. Exception to this are paths, they're just examples with
 # the real defaults being based on configure options. The paths listed here
 # are for configure --prefix=/usr --sysconfdir=/etc --localstatedir=/var
-# --with-ssldir=/etc/ssl
+# --with-ssldir=/var/lib/ssl --libexecdir=/usr/lib
 
 # Base directory where to store runtime data.
 #base_dir = /var/run/dovecot/
 
 # Protocols we want to be serving: imap imaps pop3 pop3s
 # If you only want to use dovecot-auth, you can set this to "none".
-#protocols = imap imaps
+#protocols = imap imaps pop3 pop3s
 
 # IP or host address where to listen in for connections. It's not currently
 # possible to specify multiple addresses. "*" listens in all IPv4 interfaces.
@@ -91,8 +91,8 @@
 # dropping root privileges, so keep the key file unreadable by anyone but
 # root. Included doc/mkcert.sh can be used to easily generate self-signed
 # certificate, just make sure to update the domains in dovecot-openssl.cnf
-#ssl_cert_file = /etc/ssl/certs/dovecot.pem
-#ssl_key_file = /etc/ssl/private/dovecot.pem
+ssl_cert_file = /var/lib/ssl/certs/dovecot.cert
+ssl_key_file = /var/lib/ssl/private/dovecot.key
 
 # If key file is password protected, give the password here. Alternatively
 # give it when starting dovecot with -p parameter.
@@ -255,7 +255,7 @@
 # Group to enable temporarily for privileged operations. Currently this is
 # used only for creating mbox dotlock files when creation fails for INBOX.
 # Typically this is set to "mail" to give access to /var/mail.
-#mail_privileged_group =
+mail_privileged_group = mail
 
 # Grant access to these supplementary groups for mail processes. Typically
 # these are used to set up access to shared mailboxes. Note that it may be
@@ -309,6 +309,7 @@
 # Dotlocking uses some tricks which may create more disk I/O than other locking
 # methods. NFS users: flock doesn't work, remember to change mmap_disable.
 #lock_method = fcntl
+lock_method = fcntl
 
 # Drop all privileges before exec()ing the mail process. This is mostly
 # meant for debugging, otherwise you don't get core dumps. It could be a small
@@ -620,7 +621,7 @@
   # installations. %08Xu%08Xv will be the new default, so use it for new
   # installations.
   #
-  #pop3_uidl_format = 
+  pop3_uidl_format = %08Xu%08Xv
 
   # POP3 logout format string:
   #  %t - number of TOP commands
@@ -976,7 +977,7 @@
   #ssl_username_from_cert = no
 
   # It's possible to export the authentication interface to other programs:
-  #socket listen {
+  socket listen {
     #master {
       # Master socket provides access to userdb information. It's typically
       # used to give Dovecot's local delivery agent access to userdb so it
@@ -994,7 +995,13 @@
       #path = /var/run/dovecot/auth-client
       #mode = 0660
     #}
-  #}
+#    client {#postfix
+#      path = /var/spool/postfix/private/auth
+#      mode = 0660
+#      user = postfix
+#      group = postfix
+#    }#postfix
+  }
 }
 
 # If you wish to use another authentication server than dovecot-auth, you can
 
design & coding: Vladimir Lettiev aka crux © 2004-2005, Andrew Avramenko aka liks © 2007-2008
current maintainer: Michael Shigorin