Well John, i tried it already, something like that:
---------------------------------------------------------------
mysql_users_aliases:
  driver = redirect
  file_transport = address_file
  pipe_transport = address_pipe
  data = ${lookup mysql{ SELECT id FROM users \
          WHERE id='${quote_mysql:[EMAIL PROTECTED]' }} \n \
          ${lookup mysql{SELECT sendto FROM aliases \
          WHERE (username='$local_part' AND domainname='$domain')}}
no_more

mysql_anyone:
  driver = redirect
  file_transport = address_file
  pipe_transport = address_pipe
  data = ${lookup mysql{SELECT sendto FROM aliases \
  WHERE (username='*' AND domainname='$domain')}}
------------------------------------------------------------------
But any email goes to [EMAIL PROTECTED] if it has such an entry in mysql 
aliases.
I wonder if you can provide your routers so i can quickly solve this
problem.. Thank you!!



>>
>> Notice please the "$lookup mysql*@" , which means (from the
>> book) that if the query fails then it searches only the
>> domain part , ignoring everything to "*".  But i am
>> dissapointed because it is not working..
>
> I was under the impression that the * (ie default values) can only be used
> with
> single key lookup types. MySQL, on the other hand, is a query style
> lookup. The
> easiest thing to do perhaps would be to have a second router to catch
> anything
> that passes through the first one.
>  John
>
> --
> ## List details at http://www.exim.org/mailman/listinfo/exim-users
> ## Exim details at http://www.exim.org/
> ## Please use the Wiki with this list - http://www.exim.org/eximwiki/
>



-- 
## List details at http://www.exim.org/mailman/listinfo/exim-users 
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://www.exim.org/eximwiki/

Reply via email to