/etc/pysieved.ini is in pysieved 1.2-1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 | [main]
# Authentication back-end to use
auth = passwd
# User DB back-end to use
userdb = passwd
# Storage back-end to use
storage = Dovecot
# Who are SIEVE scripts intended for ? (Dovecot or Exim)
consumer = Dovecot
# Bind to what address? (Ignored with --stdin)
#bindaddr = 127.0.0.1
# Listen on what port? (Ignored with --stdin)
port = 2000
# Write a pidfile here
pidfile = /var/run/pysieved.pid
# Prepend this path to result of userdb lookup if not absolute
#base = /var/mail
# Where to create temporary files
#tmpdir = /tmp
[TLS]
# Require STARTTLS before authentication
#required = False
# TLS private key file
#key = /etc/ssl/private/woozle.org.key
# TLS certificate file
#cert = /etc/ssl/private/woozle.org.pem
# Passphrase if the TLS private key is encrypted
# (this file should not be world-readable !)
#passphrase = magic
[SASL]
# How do we identify ourself to saslauthd?
service = managesieve
# Where's the magic mux file?
mux = /var/run/saslauthd/mux
[PAM]
# How do we identify ourself to PAM?
service = pysieved
[Virtual]
# Path to storage. %u = user, %d = domain
path = /usr/local/virtual/%d/%u
# What domain to use if no domain name is specified by the user
#defaultdomain =
# What UID and GID should own all files? -1 to not bother
uid = 1001
gid = 1001
[LDAP]
# Where the LDAP server is located.
ldap_url = ldap://127.0.0.1
# Credentials to connect to the LDAP server and perform the user search.
bind_dn = cn=root
bind_pw = foobar
# Whether to use the bind method of authentication
# (the alternative is to have pysieved compare passwords,
# which requires the password attribute to be readable
# with the above credentials).
auth_bind = True
# Base, scope and filter to perform the user search.
# In the filter, the available substitutions are :
# %l : login (as provided by the user for authentication)
# %u : username part of login
# %d : domain part of login (defaultdomain if none)
# %m : email address (as derived from %u@%d)
base =
scope = sub
filter = uid=%u
#default_domain =
# What UID and GID to use if not found in LDAP ?
default_uid = 1001
default_gid = 1001
# Attributes to look for.
#pw_attr = userPassword
#uid_attr = uidNumber
#gid_attr = gidNumber
#home_attr = homeDirectory
[MySQL]
dbhost = localhost
dbuser = user
dbpass = pass
dbname = db
auth_query = SELECT username FROM users WHERE username = "%(username)s" AND password = "%(password)s" AND (active = "1")
user_query = SELECT homedir FROM users WHERE username = "%(username)s" AND (active = "1")
list_query = SELECT name FROM sieve WHERE address = "%(username)s"
get_query = SELECT script FROM sieve WHERE address = "%(username)s" AND name = "%(name)s"
update_query = UPDATE sieve SET script = "%(script)s" WHERE address = "%(username)s" AND name = "%(name)s"
insert_query = INSERT INTO sieve ( address , name , script ) values ( "%(username)s" , "%(name)s" , "%(script)s" )
delete_query = DELETE FROM sieve WHERE address = "%(username)s" AND name = "%(name)s"
active_query = SELECT name FROM sieve WHERE address = "%(username)s" AND active > 0 LIMIT 1
set_active_query = UPDATE sieve SET active = 1 WHERE address = "%(username)s" AND name = "%(name)s"
clear_active_query = UPDATE sieve SET active = 0 WHERE address = "%(username)s" AND active > 0
[htpasswd]
passwdfile = /etc/exim/virtual/passwd
[Dovecot]
# Path to Dovecot's auth socket (do not set unless you're using Dovecot auth)
#mux = /var/spool/postfix/auth/dovecot
# Path to Dovecot's master socket (if using Dovecot userdb lookup)
#master = /var/run/dovecot/auth-master
# Path to sievec
sievec = /usr/bin/sievec
# Where in user directory to store scripts
scripts = .pysieved
# Filename used for the active SIEVE filter (see README.Dovecot)
active = .dovecot.sieve
# What user/group owns the mail storage (-1 to never setuid/setgid)
uid = -1
gid = -1
[Exim]
# Path to sendmail
sendmail = /usr/sbin/sendmail
# Where in user directory to store scripts
scripts = .pysieved
# Filename used for the active SIEVE filter
active = .forward
# What user/group owns the mail storage (-1 to never setuid/setgid)
uid = -1
gid = -1
[Courier]
# Courier's authentication socket
mux = /var/run/courier-authlib/socket
# Service name to use for communications on that socket
service = managesieve
# What user/group owns the mail storage (-1 to never setuid/setgid)
uid = -1
gid = -1
[lmtpd]
# Where in user directory to store scripts
scripts = .pysieved
# Filename used for the active SIEVE filter
active = ssfilter
# Program to validate SIEVE scripts
checker = /usr/bin/sieve-check
|