escape backslashes in PassCmd examples

the config parser strips one level of backslash escapes.
This commit is contained in:
Oswald Buddenhagen 2015-03-22 11:44:33 +01:00
parent 4842f5148d
commit c0ba6f0395

View File

@ -16,11 +16,11 @@ Pass xxxxxxxx
# Fetch password from gnome-keyring: # Fetch password from gnome-keyring:
#PassCmd "gnome-keyring-query get mail_pw" #PassCmd "gnome-keyring-query get mail_pw"
# Fetch password from .netrc: # Fetch password from .netrc:
#PassCmd "sed -n -e 's,^machine work\.host\.com login tehuser password \(.*\),\1,p' < $HOME/.netrc" #PassCmd "sed -n -e 's,^machine work\\.host\\.com login tehuser password \\(.*\\),\\1,p' < $HOME/.netrc"
# Fetch password from a gpg-encrypted file: # Fetch password from a gpg-encrypted file:
#PassCmd "gpg --quiet --for-your-eyes-only --decrypt $HOME/imappassword.gpg" #PassCmd "gpg --quiet --for-your-eyes-only --decrypt $HOME/imappassword.gpg"
# Fetch password from pwmd (http://pwmd.sourceforge.net/): # Fetch password from pwmd (http://pwmd.sourceforge.net/):
#PassCmd "echo -ne 'GET myIsp\tpassword' | pwmc datafile" #PassCmd "echo -ne 'GET myIsp\\tpassword' | pwmc datafile"
# On Mac OS X, run "KeyChain Access" -- File->New Password Item. Fill out form using # On Mac OS X, run "KeyChain Access" -- File->New Password Item. Fill out form using
# "Keychain Item Name" http://IMAPSERVER (note: the "http://" is a hack) # "Keychain Item Name" http://IMAPSERVER (note: the "http://" is a hack)
# "Account Name" USERNAME # "Account Name" USERNAME