You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

rspamadm.1 1.9KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129
  1. .TH "RSPAMADM" "1" "" "Rspamd User Manual" ""
  2. .SH NAME
  3. .PP
  4. rspamadm \- rspamd administration utility
  5. .SH SYNOPSIS
  6. .PP
  7. rspamadm [\f[I]global_options\f[]] [\f[I]command\f[]]
  8. [\f[I]command_options\f[]]...
  9. .PP
  10. rspamadm \-l
  11. .PP
  12. rspamadm help
  13. .PP
  14. rspamadm help
  15. .PP
  16. rspamadm \-\-help
  17. .SH DESCRIPTION
  18. .PP
  19. \f[C]rspamadm\f[] is a routine to manage rspamd spam filtering system.
  20. It is intended to perform such actions as merging databases, performing
  21. configuration tests, encrypting passwords, signing configurations and so
  22. on.
  23. You can get a list of available commands by running
  24. .IP
  25. .nf
  26. \f[C]
  27. rspamadm\ \-l
  28. \f[]
  29. .fi
  30. .SH OPTIONS
  31. .TP
  32. .B \-h, \-\-help
  33. Show help message
  34. .RS
  35. .RE
  36. .TP
  37. .B \-v, \-\-verbose
  38. Enable verbose output
  39. .RS
  40. .RE
  41. .TP
  42. .B \-l, \-\-list\-commands
  43. List available commands
  44. .RS
  45. .RE
  46. .TP
  47. .B \-\-version
  48. Show version
  49. .RS
  50. .RE
  51. .TP
  52. .B \-\-var=\f[I]value\f[]
  53. Redefine ucl variable in format \f[C]VARIABLE=VALUE\f[]
  54. .RS
  55. .RE
  56. .SH RETURN VALUE
  57. .PP
  58. On exit \f[C]rspamadm\f[] returns \f[C]0\f[] if operation was
  59. successfull and an error code otherwise.
  60. .SH EXAMPLES
  61. .PP
  62. Get help for pw command:
  63. .IP
  64. .nf
  65. \f[C]
  66. rspamadm\ help\ pw
  67. rspamadm\ pw\ \-\-help
  68. \f[]
  69. .fi
  70. .PP
  71. Encrypt controller\[aq]s password:
  72. .IP
  73. .nf
  74. \f[C]
  75. rspamadm\ pw\ encrypt
  76. \f[]
  77. .fi
  78. .PP
  79. Merge fuzzy databases:
  80. .IP
  81. .nf
  82. \f[C]
  83. rspamadm\ fuzzy_merge\ \-s\ data1.sqlite\ \-s\ data2.sqlite\ \-t\ dest.sqlite
  84. \f[]
  85. .fi
  86. .PP
  87. Perform configuration test:
  88. .IP
  89. .nf
  90. \f[C]
  91. rspamadm\ configtest\ \-c\ rspamd.conf
  92. \f[]
  93. .fi
  94. .PP
  95. Test configuration strictly and redefine some ucl vars:
  96. .IP
  97. .nf
  98. \f[C]
  99. rspamadm\ \-\-var=DBDIR=/tmp\ configtest\ \-c\ ./rspamd.conf\ \-s
  100. \f[]
  101. .fi
  102. .PP
  103. Dump the processed configuration:
  104. .IP
  105. .nf
  106. \f[C]
  107. rspamadm\ configdump
  108. \f[]
  109. .fi
  110. .PP
  111. Dump the processed configuration as JSON string:
  112. .IP
  113. .nf
  114. \f[C]
  115. rspamadm\ configdump\ \-j
  116. \f[]
  117. .fi
  118. .PP
  119. Generate a keypair to use for HTTPCrypt encryption:
  120. .IP
  121. .nf
  122. \f[C]
  123. rspamadm\ keypair
  124. \f[]
  125. .fi
  126. .SH SEE ALSO
  127. .PP
  128. Rspamd documentation and source codes may be downloaded from
  129. <https://rspamd.com/>.