Hi Sandy,
Sandy Drobic wrote:
Gianni Socionovo wrote:
if i run sieveshell i got:
/usr/bin/sieveshell -u cyrus -a cyrus 127.0.0.1
connecting to 127.0.0.1
unable to connect to server at /usr/bin/sieveshell line 169
Please try to log in as a mail user, not as mail admin. The account
used to log in needs to have a mailbox.
By the way, this has nothing to do with webcyradm. Though you need to
get the basic sieveshell function working before you can think about
webcyradm.
I got the same error with mailbox users both with extension
myuser.mydomain.dom (the way i recorded the users in table accountuser
for postfix and cyrus-imap) both with only myuser.
With words "webcyradm work great" I meant that postfix, mailbox traffic,
imap mailboxes user creation, cyrus imap access to mailboxes, mailboxes
quota work all, the only thing doesn't work is sieve and consequently
vacation and message filtering.
I just posted to web-cyradm mailing list to find a solution but
without results.
So I think is something related to SuSE OS.
Any idea will be very wellcome, because i spent yet a lot of time to
find a solution without getting anyone.
Please post what steps you took to configure webcyradm, especially the
sql-lookup and the database structure.
Sandy
****** /etc/pam_pgsql.conf *********
database=postfix
host=127.0.0.1
user=postfix
password=secret
table=accountuser
user_column=username
pwd_column=password
pw_type=md5
****** pam_pgsl.specs *********
# $Id:$
Summary: Provides support for authenticating against PostgreSQL tables for PAM-enabled applications.
Name:pam-pgsql
Version: 0.5.2
Release: 5
Copyright: GPL
URL: http://libpam-pgsql.codecastle.com/
Group:System Environment/Base
Packager: Andrew Koros
Source: http://prdownloads.sourceforge.net/pam-pgsql/%{name}_%{version}.orig.tar.gz
Buildroot: %{_tmppath}/%{name}_%{version}-root
Source2: pam_pgsql.conf
Source3: pam_pgsql.conf.sample
# Patch
Source4: pam-pgsql_0.5.2-5.diff.gz
Requires: mhash,pam,postgresql-libs
BuildPrereq: mhash-devel
BuildPrereq: postgresql-devel
%description
This module provides support to authenticate against PostgreSQL
tables for PAM-enabled applications.
This module is based in part on the FreeBSD pam_unix module, and
the Debian pam_mysql module, but was written from scratch using
the two as a reference.
%prep
%setup
gunzip < %{SOURCE4} | patch -p1
%build
CFLAGS="$RPM_OPT_FLAGS"
./configure
make DEBUG="$RPM_OPT_FLAGS" INCLUDE="-I/usr/include/pgsql"
mkdir -p $RPM_BUILD_ROOT/lib/security
make install ROOTDIR=$RPM_BUILD_ROOT
%install
mkdir $RPM_BUILD_ROOT/etc
install %{SOURCE2} $RPM_BUILD_ROOT/etc/
install %{SOURCE3} .
%clean
rm -rf $RPM_BUILD_ROOT
###########################################################
%files
%defattr(-,root,root)
/lib/
/etc/
%doc CREDITS README debian/ TODO pam_pgsql.conf.sample
##########################################################
Postfix lookups
******* pgsql-canonical.cf ******
#################
# pgsql config file for canonical lookups on postfix
host = 127.0.0.1
user = postfix
password = secret
dbname = postfix
table = virtual
select_field = alias
where_field = username
additional_conditions = and status = '1' limit 1
******* pgsql-virtual.cf ******
#################
# config file for access pgsl table virtual
host = 127.0.0.1
user = postfix
password = postfix
dbname = postfix
table = virtual
select_field = dest
where_field = alias
additional_conditions = and status = '1'
******* pgsql-mydestination.cf ******
#################
# config file for access pgsl local domain
host = 127.0.0.1
user = postfix
password = secret
dbname = postfix
table = domain
select_field = domain_name
where_field = domain_name
Postfix main file
******** postconf -n *********
alias_maps = hash:/etc/aliases
biff = no
body_checks = regexp:/etc/postfix/mep_body.cf
canonical_maps = hash:/etc/postfix/canonical
disable_dns_lookups = no
header_checks = regexp:/etc/postfix/mep_header.cf
html_directory = /usr/share/doc/packages/postfix/html
inet_interfaces = $myhostname, localhost, xxx.xxx.xxx.xxx
local_recipient_maps = proxy:unix:passwd.byname $alias_maps
mail_spool_directory = /var/mail
fallback_transport = lmtp:unix:public/lmtp
mailbox_size_limit = 200000000
mailbox_transport = lmtp:unix:public/lmtp
message_size_limit = 10240000
mydestination = $mydomain,$myhostname, localhost.$mydomain, localhost, localhost.localdomain
proxy_read_maps = proxy:unix:passwd.byname proxy:pgsql:/etc/postfix/pgsql-virtual.cf proxy:pgsql:/etc/postfix/pgsql-canonical.cf proxy:pgsql:/etc/postfix/pgsql-mydestination.cf
sender_canonical_maps = proxy:pgsql:/etc/postfix/pgsql-canonical.cf
virtual_alias_domains = proxy:pgsql:/etc/postfix/pgsql-mydestination.cf
virtual_gid_maps = static:200
virtual_mailbox_base = /var/spool/virtual
virtual_uid_maps = static:200
relocated_maps = hash:/etc/postfix/relocated
sendmail_path = /usr/sbin/sendmail
setgid_group = maildrop
smtp_sasl_auth_enable = no
smtp_use_tls = no
smtpd_recipient_restrictions = reject_invalid_hostname,reject_non_fqdn_sender,reject_non_fqdn_recipient,reject_unknown_sender_domain,reject_unknown_recipient_domain,reject_unauth_pipelining,permit_mynetworks,reject_unauth_destination,reject_rbl_client zombie.dnsbl.sorbs.net,reject_rbl_client relays.ordb.org,reject_rbl_client opm.blitzed.org,reject_rbl_client list.dsbl.org,reject_rbl_client sbl.spamhaus.org,reject_rbl_client blackholes.easynet.nl,permit
smtpd_sasl_auth_enable = no
smtpd_sender_restrictions = hash:/etc/postfix/access
smtpd_use_tls = no
transport_maps = hash:/etc/postfix/transport
i hope it enoufh.
thanks gianni.
--
_________________________________________________
*/Gianni Socionovo/*
//