On 2008-02-27, at 1126, Steve wrote:
Not sure what you are saying. ALL onchange works for me now that I have fixed my onchange script. The key for me was it runs as user www, which has no security to do things, for example, like modify vpopmail user directories. So, there was nothing wrong except my script. The script would run say as root from the command line using say vadduser since root always has security. But from qmailadmin, did not have access. So, try it on the command line, if it works, it's likely security,
the ONCHANGE mechanism was designed to be used in conjunction with some mechanism which allows a non-root process (like the "onchange" script) to trigger a root process to execute on demand.
an example of this, and what i'm doing on my own server, is a "qmail- updater" service. the way it works is this:
- the "onchange" script, which can potentially be executed by ANY userid, sends a short line of data to a named pipe.
- there is a process called "pipe-watcher" which is listening on that named pipe. when it receives input, it logs what it received, and then it runs another command. because "pipe-watcher" is running as root, the other command it executes will also run as root.
- this other process (called "update-qmail" on my server and on the web site, but you can make it run any script or program you like, by changing the "pipe-watcher" script itself) actually does the work. on my server, "update-qmail" rebuilds the auth.cdb and validrcptto.cdb files.
this web page explains it in more detail, although it does assume you already have some familiarity with the other scripts on my pages.
http://qmail.jms1.net/scripts/qmail-updater.shtml
--------------------------------------------------------
| John M. Simpson -- KG4ZOW -- Programmer At Large |
| http://www.jms1.net/ <[EMAIL PROTECTED]> |
--------------------------------------------------------
| Hope for America -- http://www.ronpaul2008.com/ |
--------------------------------------------------------
PGP.sig
Description: This is a digitally signed message part
!DSPAM:47d0a13f120502988042618!
