summaryrefslogtreecommitdiff
path: root/test/confs/4003
diff options
context:
space:
mode:
authorJeremy Harris <jgh146exb@wizmail.org>2014-12-21 21:32:13 +0000
committerJeremy Harris <jgh146exb@wizmail.org>2014-12-21 21:36:47 +0000
commita60f6c07eea74e79b88828295a191e79595d8960 (patch)
tree0bbb7f0cf598a4da9c31124ddbf146a3a8784ffb /test/confs/4003
parent21bc4865a31e8fba169d6da095890f842fc0643a (diff)
Testsuite: cases for malware= interfaces to f-protd, aveserver, fsecure, soophie & clamav
There are running against scripts not the rea thing so only useful for spotting gross breakage.
Diffstat (limited to 'test/confs/4003')
-rw-r--r--test/confs/400333
1 files changed, 33 insertions, 0 deletions
diff --git a/test/confs/4003 b/test/confs/4003
new file mode 100644
index 000000000..e2d65baa1
--- /dev/null
+++ b/test/confs/4003
@@ -0,0 +1,33 @@
+# Exim test configuration 4002
+# Content-scan: fsecure interface
+
+exim_path = EXIM_PATH
+host_lookup_order = bydns
+primary_hostname = myhost.test.ex
+spool_directory = DIR/spool
+log_file_path = DIR/spool/log/%slog
+gecos_pattern = ""
+gecos_name = CALLER_NAME
+
+av_scanner = fsecure : DIR/eximdir/fsec_sock
+
+# ----- Main settings -----
+
+acl_smtp_rcpt = accept
+acl_smtp_data = c_data
+
+begin acl
+
+c_data:
+ accept !malware = *
+ deny logwrite = malware_name $malware_name
+
+# ----- Routers -----
+
+begin routers
+
+r:
+ driver = redirect
+ data = :blackhole:
+
+# End