| 1 | # Basic configuration setting |
| 2 | |
| 3 | # Check that Exim can handle settings of all the configuration options that |
| 4 | # are not dependent on optional features in the binary. This catches out error |
| 5 | # in putting new options in the wrong order. Well, sometimes it does. We get |
| 6 | # it to print out a sample set of configuration variables. |
| 7 | |
| 8 | exim -bP accept_8bitmime \ |
| 9 | bounce_message_file \ |
| 10 | callout_domain_negative_expire \ |
| 11 | daemon_smtp_ports \ |
| 12 | envelope_to_remove \ |
| 13 | finduser_retries \ |
| 14 | gecos_name \ |
| 15 | headers_charset \ |
| 16 | ignore_bounce_errors_after \ |
| 17 | keep_malformed \ |
| 18 | local_from_check \ |
| 19 | max_username_length \ |
| 20 | never_users \ |
| 21 | percent_hack_domains \ |
| 22 | qualify_domain \ |
| 23 | retry_interval_max \ |
| 24 | receive_timeout \ |
| 25 | sender_unqualified_hosts \ |
| 26 | tcp_nodelay \ |
| 27 | trusted_users \ |
| 28 | unknown_login \ |
| 29 | warn_message_file |
| 30 | **** |