diff options
author | Christopher Baines <mail@cbaines.net> | 2019-05-02 20:19:59 +0100 |
---|---|---|
committer | Christopher Baines <mail@cbaines.net> | 2019-05-07 20:52:02 +0100 |
commit | 5b3d3cf71c1947bb43237b28d231d249f9dfbe49 (patch) | |
tree | 9d7340bf6f56b8bb1df5f11651010999decbf4e3 | |
parent | 338defe0cbe156e8416647035403fccf059555e0 (diff) | |
download | guix-5b3d3cf71c1947bb43237b28d231d249f9dfbe49.tar.gz |
services: dovecot: Rename auth-verbose-passwords?.
* gnu/services/mail.scm (dovecot-configuration)[auth-verbose-passwords?]: Rename to auth-verbose-passwords, and change the type to a string, as this parameter can take one of three string values. * doc/guix.texi (Dovecot service): Update the corresponding documentation.
-rw-r--r-- | doc/guix.texi | 4 | ||||
-rw-r--r-- | gnu/services/mail.scm | 4 |
2 files changed, 4 insertions, 4 deletions
diff --git a/doc/guix.texi b/doc/guix.texi index 2515ec146f..1caecfc3e4 100644 --- a/doc/guix.texi +++ b/doc/guix.texi @@ -15878,13 +15878,13 @@ failed. Defaults to @samp{#f}. @end deftypevr -@deftypevr {@code{dovecot-configuration} parameter} boolean auth-verbose-passwords? +@deftypevr {@code{dovecot-configuration} parameter} string auth-verbose-passwords In case of password mismatches, log the attempted password. Valid values are no, plain and sha1. sha1 can be useful for detecting brute force password attempts vs. user simply trying the same password over and over again. You can also truncate the value to n chars by appending ":n" (e.g.@: sha1:6). -Defaults to @samp{#f}. +Defaults to @samp{"no"}. @end deftypevr @deftypevr {@code{dovecot-configuration} parameter} boolean auth-debug? diff --git a/gnu/services/mail.scm b/gnu/services/mail.scm index 0dabfed4cb..216b2c80b0 100644 --- a/gnu/services/mail.scm +++ b/gnu/services/mail.scm @@ -806,8 +806,8 @@ standard facilities are supported.") "Log unsuccessful authentication attempts and the reasons why they failed.") - (auth-verbose-passwords? - (boolean #f) + (auth-verbose-passwords + (string "no") "In case of password mismatches, log the attempted password. Valid values are no, plain and sha1. sha1 can be useful for detecting brute force password attempts vs. user simply trying the same password over |