summaryrefslogtreecommitdiffstats
path: root/conf
diff options
context:
space:
mode:
authorVsevolod Stakhov <vsevolod@highsecure.ru>2018-07-18 14:26:25 +0100
committerVsevolod Stakhov <vsevolod@highsecure.ru>2018-07-18 14:26:25 +0100
commit4a5f7b6caecf1cc1f1911018610953e68733e139 (patch)
treeb50df9d4b6e40d7a1da8dad3f9e2f0f145ed5625 /conf
parent41dbaa134df0ebd36d8b286dbcb2b8fc673e8e64 (diff)
downloadrspamd-4a5f7b6caecf1cc1f1911018610953e68733e139.tar.gz
rspamd-4a5f7b6caecf1cc1f1911018610953e68733e139.zip
[Conf] Add fallback maps
Diffstat (limited to 'conf')
-rw-r--r--conf/modules.d/mid.conf3
-rw-r--r--conf/modules.d/mime_types.conf3
-rw-r--r--conf/modules.d/phishing.conf3
-rw-r--r--conf/modules.d/surbl.conf6
-rw-r--r--conf/modules.d/whitelist.conf4
5 files changed, 14 insertions, 5 deletions
diff --git a/conf/modules.d/mid.conf b/conf/modules.d/mid.conf
index c6e305d7b..589ce746a 100644
--- a/conf/modules.d/mid.conf
+++ b/conf/modules.d/mid.conf
@@ -17,7 +17,8 @@ mid = {
source = {
url = [
"https://maps.rspamd.com/rspamd/mid.inc.zst",
- "$LOCAL_CONFDIR/local.d/mid.inc"
+ "$LOCAL_CONFDIR/local.d/mid.inc",
+ "fallback+file://${CONFDIR}/mid.inc"
];
}
diff --git a/conf/modules.d/mime_types.conf b/conf/modules.d/mime_types.conf
index b27560d6f..7bbc0aa08 100644
--- a/conf/modules.d/mime_types.conf
+++ b/conf/modules.d/mime_types.conf
@@ -16,7 +16,8 @@
mime_types {
file = [
"https://maps.rspamd.com/rspamd/mime_types.inc.zst",
- "${DBDIR}/mime_types.inc.local"
+ "${DBDIR}/mime_types.inc.local",
+ "fallback+file://${CONFDIR}/mime_types.inc"
]
# Match specific extensions to specific content types
diff --git a/conf/modules.d/phishing.conf b/conf/modules.d/phishing.conf
index 2ad2ce8f4..dd77832a8 100644
--- a/conf/modules.d/phishing.conf
+++ b/conf/modules.d/phishing.conf
@@ -26,7 +26,8 @@ phishing {
# Make exclusions for known redirectors
redirector_domains = [
"https://maps.rspamd.com/rspamd/redirectors.inc.zst:REDIRECTOR_FALSE",
- "$LOCAL_CONFDIR/local.d/redirectors.inc:LOCAL_REDIRECTOR_FALSE"
+ "$LOCAL_CONFDIR/local.d/redirectors.inc:LOCAL_REDIRECTOR_FALSE",
+ "fallback+file://${CONFDIR}/redirectors.inc:REDIRECTOR_FALSE"
];
.include(try=true,priority=5) "${DBDIR}/dynamic/phishing.conf"
diff --git a/conf/modules.d/surbl.conf b/conf/modules.d/surbl.conf
index e0e60baa9..02acae95e 100644
--- a/conf/modules.d/surbl.conf
+++ b/conf/modules.d/surbl.conf
@@ -16,11 +16,13 @@
surbl {
whitelist = [
"https://maps.rspamd.com/rspamd/surbl-whitelist.inc.zst",
- "${DBDIR}/surbl-whitelist.inc.local"
+ "${DBDIR}/surbl-whitelist.inc.local",
+ "fallback+file://${CONFDIR}/surbl-whitelist.inc"
];
exceptions = [
"https://maps.rspamd.com/rspamd/2tld.inc.zst",
- "${DBDIR}/2tld.inc.local"
+ "${DBDIR}/2tld.inc.local",
+ "fallback+file://${CONFDIR}/2tld.inc"
];
rules {
diff --git a/conf/modules.d/whitelist.conf b/conf/modules.d/whitelist.conf
index b3f93d5f5..0665232ab 100644
--- a/conf/modules.d/whitelist.conf
+++ b/conf/modules.d/whitelist.conf
@@ -20,6 +20,7 @@ whitelist {
domains = [
"https://maps.rspamd.com/rspamd/spf_whitelist.inc.zst",
"${DBDIR}/spf_whitelist.inc.local",
+ "fallback+file://${CONFDIR}/spf_whitelist.inc"
];
score = -1.0
description = "Mail comes from the whitelisted domain and has a valid SPF policy";
@@ -30,6 +31,7 @@ whitelist {
domains = [
"https://maps.rspamd.com/rspamd/dkim_whitelist.inc.zst",
"${DBDIR}/dkim_whitelist.inc.local",
+ "fallback+file://${CONFDIR}/dkim_whitelist.inc"
];
description = "Mail comes from the whitelisted domain and has a valid DKIM signature";
score = -1.0
@@ -40,6 +42,7 @@ whitelist {
domains = [
"https://maps.rspamd.com/rspamd/spf_dkim_whitelist.inc.zst",
"${DBDIR}/spf_dkim_whitelist.inc.local",
+ "fallback+file://${CONFDIR}/spf_dkim_whitelist.inc"
];
score = -3.0;
description = "Mail comes from the whitelisted domain and has valid SPF and DKIM policies";
@@ -49,6 +52,7 @@ whitelist {
domains = [
"https://maps.rspamd.com/rspamd/dmarc_whitelist.inc.zst",
"${DBDIR}/dmarc_whitelist.inc.local",
+ "fallback+file://${CONFDIR}/dmarc_whitelist.inc"
];
score = -7.0;
description = "Mail comes from the whitelisted domain and has valid DMARC and DKIM policies";