[Midnightbsd-cvs] mports [16990] trunk/mail/spamassassin: spamassassin 3.4.0

laffer1 at midnightbsd.org laffer1 at midnightbsd.org
Thu Sep 11 21:45:47 EDT 2014


Revision: 16990
          http://svnweb.midnightbsd.org/mports/?rev=16990
Author:   laffer1
Date:     2014-09-11 21:45:46 -0400 (Thu, 11 Sep 2014)
Log Message:
-----------
spamassassin 3.4.0

Modified Paths:
--------------
    trunk/mail/spamassassin/Makefile
    trunk/mail/spamassassin/distinfo
    trunk/mail/spamassassin/files/sa-spamd.in
    trunk/mail/spamassassin/pkg-descr
    trunk/mail/spamassassin/pkg-plist

Added Paths:
-----------
    trunk/mail/spamassassin/files/3.4.0-RELEASE-NOTES.txt
    trunk/mail/spamassassin/files/patch-UPGRADE
    trunk/mail/spamassassin/files/patch-bug7018
    trunk/mail/spamassassin/files/patch-bug7057
    trunk/mail/spamassassin/files/patch-bug7065
    trunk/mail/spamassassin/files/pkg-message.in

Removed Paths:
-------------
    trunk/mail/spamassassin/files/manpages
    trunk/mail/spamassassin/files/patch-bug6624
    trunk/mail/spamassassin/files/patch-bug6655
    trunk/mail/spamassassin/files/patch-bug6698
    trunk/mail/spamassassin/files/pkg-install.in
    trunk/mail/spamassassin/pkg-deinstall
    trunk/mail/spamassassin/pkg-install
    trunk/mail/spamassassin/pkg-message

Modified: trunk/mail/spamassassin/Makefile
===================================================================
--- trunk/mail/spamassassin/Makefile	2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/Makefile	2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,298 +1,178 @@
 # $MidnightBSD$
 
-PORTNAME=	Mail-SpamAssassin
-PORTVERSION=	3.3.2
-PORTREVISION=	1
-CATEGORIES=	mail perl5
+PORTNAME=	spamassassin
+PORTVERSION=	3.4.0
+PORTREVISION?=	0
+CATEGORIES?=	mail perl5
 MASTER_SITES=	${MASTER_SITE_APACHE:S/$/:apache/} ${MASTER_SITE_PERL_CPAN:S/$/:cpan/}
 MASTER_SITE_SUBDIR=	spamassassin/source/:apache Mail/:cpan
-PKGNAMEPREFIX=	p5-
+DISTNAME=	Mail-SpamAssassin-${PORTVERSION}
 DISTFILES=	${DISTNAME}${EXTRACT_SUFX}:apache,cpan
 
-MAINTAINER=	ports at MidnightBSD.org
-COMMENT=	A highly efficient mail filter for identifying spam
+MAINTAINER?=	ports at MidnightBSD.org
+COMMENT?=	Highly efficient mail filter for identifying spam
+
 LICENSE=	apache2
 
-RUN_DEPENDS=	p5-NetAddr-IP>=4.00.7:${PORTSDIR}/net-mgmt/p5-NetAddr-IP \
+ALL_DEPENDS=	p5-Encode-Detect>=0:${PORTSDIR}/converters/p5-Encode-Detect \
+		p5-HTML-Parser>=3.46:${PORTSDIR}/www/p5-HTML-Parser \
+		p5-HTTP-Date>=0:${PORTSDIR}/www/p5-HTTP-Date \
+		p5-IO-Socket-IP>=0:${PORTSDIR}/net/p5-IO-Socket-IP \
 		p5-Net-DNS>=0.63:${PORTSDIR}/dns/p5-Net-DNS \
-		p5-HTML-Parser>=3.46:${PORTSDIR}/www/p5-HTML-Parser \
-		${SITE_PERL}/Bundle/LWP.pm:${PORTSDIR}/www/p5-libwww \
-		${SITE_PERL}/${PERL_ARCH}/Encode/Detect.pm:${PORTSDIR}/converters/p5-Encode-Detect \
-		${SITE_PERL}/Mail/Internet.pm:${PORTSDIR}/mail/p5-Mail-Tools
+		p5-NetAddr-IP>=4.010:${PORTSDIR}/net-mgmt/p5-NetAddr-IP
+BUILD_DEPENDS=	${ALL_DEPENDS}
+RUN_DEPENDS=	${ALL_DEPENDS} \
+		re2c>=.12.0:${PORTSDIR}/devel/re2c
 
-BUILD_DEPENDS=	${RUN_DEPENDS}
+CPE_VENDOR=	apache
 
+USES=		cpe
+USE_PERL5=	yes
 PERL_CONFIGURE=	yes
-USE_PERL5_RUN=	5.12+
 USE_LDCONFIG=	yes
-CONFIGURE_ARGS=	SYSCONFDIR="${PREFIX}/etc" \
-	       	CONTACT_ADDRESS="${CONTACT_ADDRESS}" \
-		LOCALSTATEDIR="/var/db/spamassassin"
 
-# You can override it if you like
-CONTACT_ADDRESS?=	The administrator of that system
+DATADIR=	${PREFIX}/share/spamassassin
+DBDIR?=		/var/db
+DOCSDIR=	${PREFIX}/share/doc/${PKGNAMEPREFIX}${PORTNAME}
+ETCDIR?=	${PREFIX}/etc/mail/spamassassin
 
-OPTIONS=	AS_ROOT "Run spamd as root (recommended)" on \
-		SPAMC "Build spamd/spamc (not for amavisd)" on \
-		SACOMPILE "sa-compile" off \
-		DKIM "DKIM/DomainKeys Identified Mail" on \
-		SSL "Build with SSL support for spamd/spamc" on \
-		GNUPG "Install GnuPG (for sa-update)" on \
-		MYSQL "Add MySQL support" off \
-		PGSQL "Add PostreSQL support" off \
-		RAZOR "Add Vipul's Razor support" on \
-		SPF_QUERY "Add SPF query support" off \
-		RELAY_COUNTRY "Relay country support" off \
-		DCC "Add DCC support (see LICENSE)" off
+SPAMASSASSIN_CONTACT_ADDRESS?=	The administrator of that system
+USERS?=		spamd
+GROUPS?=	spamd
+CONFIGURE_ARGS=	SYSCONFDIR="${PREFIX}/etc" \
+		CONTACT_ADDRESS="${SPAMASSASSIN_CONTACT_ADDRESS}" \
+		LOCALSTATEDIR="${DBDIR}/spamassassin" \
+		BUILD_SPAMC=yes
 
-.if !defined(WITHOUT_SSL)
-USE_OPENSSL=	yes
-.endif
+OPTIONS_DEFINE=		AS_ROOT GNUPG SSL UPDATE_AND_COMPILE
+OPTIONS_GROUP=		DATABASE PLUGINS
+OPTIONS_GROUP_DATABASE=	MYSQL PGSQL
+OPTIONS_GROUP_PLUGINS=	DCC DKIM PYZOR RAZOR RELAY_COUNTRY SPF_QUERY
+OPTIONS_DEFAULT=	AS_ROOT GNUPG SSL UPDATE_AND_COMPILE
 
-.include <bsd.port.pre.mk>
+AS_ROOT_DESC=		Run spamd as root (recommended)
+GNUPG_DESC=		Install GnuPG (for sa-update, optional)
+SSL_DESC=		Build spamd/spamc with SSL support
+UPDATE_AND_COMPILE_DESC=Download and compile rulesets (recommended)
 
-.if defined (WITH_SPAMC)
-CONFIGURE_ARGS+=	BUILD_SPAMC=yes
-.else
-CONFIGURE_ARGS+=	BUILD_SPAMC=no
-WITH_AS_ROOT=
-WITHOUT_SSL=1
-.endif
+DATABASE_DESC=		Optional user-config/bayes database backends
 
-.if defined(WITH_SPF_QUERY)
-RUN_DEPENDS+=	${SITE_PERL}/Mail/SPF.pm:${PORTSDIR}/mail/p5-Mail-SPF
-.endif
-.if !defined(WITHOUT_IPV6)
-RUN_DEPENDS+=	${SITE_PERL}/IO/Socket/INET6.pm:${PORTSDIR}/net/p5-IO-INET6
-.endif
+PLUGINS_DESC=		Optional SpamAssassin plugins
+DCC_DESC=		DCC digest list support (mail/dcc-dccd)
+DKIM_DESC=		Verify DKIM records (mail/p5-Mail-DKIM)
+PYZOR_DESC=		Pyzor digest list support (mail/pyzor)
+RAZOR_DESC=		Vipul's Razor digest list support (mail/razor-agents)
+RELAY_COUNTRY_DESC=	Location-based scoring (net/p5-Geo-IP)
+SPF_QUERY_DESC=		Verify SPF records (mail/p5-Mail-SPF)
 
-.if !defined(WITHOUT_SSL)
-EXTENSIONS+=	openssl
-RUN_DEPENDS+=	${SITE_PERL}/IO/Socket/SSL.pm:${PORTSDIR}/security/p5-IO-Socket-SSL
-CFLAGS+=	-I${OPENSSLINC}
-LDFLAGS+=	-L${OPENSSLLIB}
-CONFIGURE_ARGS+=	ENABLE_SSL=yes
-PLIST_SUB+=	SSL=""
-.else
-CONFIGURE_ARGS+=	ENABLE_SSL=no
-PLIST_SUB+=	SSL="@comment "
-.endif
+SUB_FILES=	pkg-message
+SUB_LIST+=	SPAMD_OWN="${USERS}:${GROUPS}"
+PLIST_SUB+=	USER=${USERS} GROUP=${GROUPS}
+OPTIONS_SUB=	yes
 
-.if !defined(WITHOUT_GNUPG)
-RUN_DEPENDS+=	gnupg>=1.4.7:${PORTSDIR}/security/gnupg
-.endif
+DCC_RUN_DEPENDS=	dcc-dccd>=1.3.111:${PORTSDIR}/mail/dcc-dccd
+DKIM_RUN_DEPENDS=	p5-IO-Socket-SSL>=0:${PORTSDIR}/security/p5-IO-Socket-SSL \
+			p5-Mail-DKIM>=0.37:${PORTSDIR}/mail/p5-Mail-DKIM \
+			p5-Crypt-OpenSSL-RSA>=0.26_1:${PORTSDIR}/security/p5-Crypt-OpenSSL-RSA
+GNUPG_RUN_DEPENDS=	gnupg1>=1.4.7:${PORTSDIR}/security/gnupg1
+MYSQL_RUN_DEPENDS=	p5-DBD-mysql>=0:${PORTSDIR}/databases/p5-DBD-mysql
+PGSQL_RUN_DEPENDS=	p5-DBD-Pg>=0:${PORTSDIR}/databases/p5-DBD-Pg
+PYZOR_RUN_DEPENDS=	pyzor:${PORTSDIR}/mail/pyzor
+RAZOR_RUN_DEPENDS=	razor-agents>=2.84:${PORTSDIR}/mail/razor-agents
+RELAY_COUNTRY_RUN_DEPENDS=	p5-Geo-IP>=0:${PORTSDIR}/net/p5-Geo-IP
+SPF_QUERY_RUN_DEPENDS=	p5-Mail-SPF>=0:${PORTSDIR}/mail/p5-Mail-SPF
 
-.if defined(WITH_MYSQL)
-RUN_DEPENDS+=	${SITE_PERL}/${PERL_ARCH}/DBD/mysql.pm:${PORTSDIR}/databases/p5-DBD-mysql
-.endif
+SSL_USE=		OPENSSL=yes
+SSL_RUN_DEPENDS=	p5-IO-Socket-SSL>=0:${PORTSDIR}/security/p5-IO-Socket-SSL
+SSL_CONFIGURE_ON=	ENABLE_SSL=yes
+SSL_CONFIGURE_OFF=	ENABLE_SSL=no
 
-.if defined(WITH_PGSQL)
-RUN_DEPENDS+=	${SITE_PERL}/${PERL_ARCH}/DBD/Pg.pm:${PORTSDIR}/databases/p5-DBD-Pg
-.endif
+# plugin names in rules/*.pre, for enabling/disabling
+DCC_INITVAR=		DCC
+DKIM_INITVAR=		DKIM
+PYZOR_INITVAR=		Pyzor
+RAZOR_INITVAR=		Razor2
+RELAY_COUNTRY_INITVAR=	RelayCountry
+SPF_QUERY_INITVAR=	SPF
+UPDATE_AND_COMPILE_INITVAR=	Rule2XSBody
 
-.if defined(WITH_RAZOR)
-RUN_DEPENDS+=	razor-agents>=2.84:${PORTSDIR}/mail/razor-agents
-.else
-.if   ${PERL_LEVEL} < 501000
-.if !defined(WITH_DKIM)
-RUN_DEPENDS+=	p5-Digest-SHA1>=2.11:${PORTSDIR}/security/p5-Digest-SHA1
-.endif
-.endif
-.endif
+DOCS=		CREDITS Changes INSTALL NOTICE PACKAGING README TRADEMARK UPGRADE USAGE procmailrc.example 3.4.0-RELEASE-NOTES.txt
+DOCSSQL=	README README.awl README.bayes awl_mysql.sql awl_pg.sql bayes_mysql.sql bayes_pg.sql userpref_mysql.sql userpref_pg.sql
+DOCSLDAP=	README README.testing sa_test.ldif
+PORTDOCS=	${DOCS} sql ldap
 
-.if defined(WITH_DKIM)
-RUN_DEPENDS+=	${SITE_PERL}/IO/Socket/SSL.pm:${PORTSDIR}/security/p5-IO-Socket-SSL
-. if ${PERL_LEVEL} < 501000
-RUN_DEPENDS+=	${SITE_PERL}/${PERL_ARCH}/Digest/SHA.pm:${PORTSDIR}/security/p5-Digest-SHA
-. endif
-RUN_DEPENDS+=	p5-Mail-DKIM>=0.37:${PORTSDIR}/mail/p5-Mail-DKIM
-RUN_DEPENDS+=	p5-Crypt-OpenSSL-RSA>=0.24:${PORTSDIR}/security/p5-Crypt-OpenSSL-RSA
-.endif
+USE_RC_SUBR=	sa-spamd
 
-.if defined(WITH_SACOMPILE)
-RUN_DEPENDS+=	re2c:${PORTSDIR}/devel/re2c
-.endif
+ALL_TARGET=	all spamc/libspamc.so
 
-.if defined(WITH_RELAY_COUNTRY)
-RUN_DEPENDS+=	${SITE_PERL}/IP/Country/Fast.pm:${PORTSDIR}/net/p5-IP-Country
-.endif
+.include <bsd.port.pre.mk>
 
-.if defined(WITH_DCC)
-RUN_DEPENDS+=	dcc-dccd>=1.3.111:${PORTSDIR}/mail/dcc-dccd
+.if ${PORT_OPTIONS:MSSL}
+CFLAGS+=	-I${OPENSSLINC}
+LDFLAGS+=	-L${OPENSSLLIB}
+ALL_TARGET+=	spamc/libsslspamc.so
 .endif
 
-MAN3=		Mail::SpamAssassin.3 \
-		Mail::SpamAssassin::AICache.3 \
-		Mail::SpamAssassin::ArchiveIterator.3 \
-		Mail::SpamAssassin::AsyncLoop.3 \
-		Mail::SpamAssassin::AutoWhitelist.3 \
-		Mail::SpamAssassin::Bayes.3 \
-		Mail::SpamAssassin::BayesStore.3 \
-		Mail::SpamAssassin::BayesStore::BDB.3 \
-		Mail::SpamAssassin::BayesStore::MySQL.3 \
-		Mail::SpamAssassin::BayesStore::PgSQL.3 \
-		Mail::SpamAssassin::BayesStore::SQL.3 \
-		Mail::SpamAssassin::Client.3 \
-		Mail::SpamAssassin::Conf.3 \
-		Mail::SpamAssassin::Conf::LDAP.3 \
-		Mail::SpamAssassin::Conf::Parser.3 \
-		Mail::SpamAssassin::Conf::SQL.3 \
-		Mail::SpamAssassin::DnsResolver.3 \
-		Mail::SpamAssassin::Logger.3 \
-		Mail::SpamAssassin::Logger::File.3 \
-		Mail::SpamAssassin::Logger::Stderr.3 \
-		Mail::SpamAssassin::Logger::Syslog.3 \
-		Mail::SpamAssassin::Message.3 \
-		Mail::SpamAssassin::Message::Metadata.3 \
-		Mail::SpamAssassin::Message::Node.3 \
-		Mail::SpamAssassin::PerMsgLearner.3 \
-		Mail::SpamAssassin::PerMsgStatus.3 \
-		Mail::SpamAssassin::PersistentAddrList.3 \
-		Mail::SpamAssassin::Plugin.3 \
-		Mail::SpamAssassin::Plugin::ASN.3 \
-		Mail::SpamAssassin::Plugin::AWL.3 \
-		Mail::SpamAssassin::Plugin::AccessDB.3 \
-		Mail::SpamAssassin::Plugin::AntiVirus.3 \
-		Mail::SpamAssassin::Plugin::AutoLearnThreshold.3 \
-		Mail::SpamAssassin::Plugin::Bayes.3 \
-		Mail::SpamAssassin::Plugin::BodyRuleBaseExtractor.3 \
-		Mail::SpamAssassin::Plugin::Check.3 \
-		Mail::SpamAssassin::Plugin::DCC.3 \
-		Mail::SpamAssassin::Plugin::DKIM.3 \
-		Mail::SpamAssassin::Plugin::Hashcash.3 \
-		Mail::SpamAssassin::Plugin::MIMEHeader.3 \
-		Mail::SpamAssassin::Plugin::OneLineBodyRuleType.3 \
-		Mail::SpamAssassin::Plugin::PhishTag.3 \
-		Mail::SpamAssassin::Plugin::Pyzor.3 \
-		Mail::SpamAssassin::Plugin::Razor2.3 \
-		Mail::SpamAssassin::Plugin::RelayCountry.3 \
-		Mail::SpamAssassin::Plugin::ReplaceTags.3 \
-		Mail::SpamAssassin::Plugin::Reuse.3 \
-		Mail::SpamAssassin::Plugin::Rule2XSBody.3 \
-		Mail::SpamAssassin::Plugin::SPF.3 \
-		Mail::SpamAssassin::Plugin::Shortcircuit.3 \
-		Mail::SpamAssassin::Plugin::SpamCop.3 \
-		Mail::SpamAssassin::Plugin::Test.3 \
-		Mail::SpamAssassin::Plugin::TextCat.3 \
-		Mail::SpamAssassin::Plugin::URIDNSBL.3 \
-		Mail::SpamAssassin::Plugin::URIDetail.3 \
-		Mail::SpamAssassin::Plugin::VBounce.3 \
-		Mail::SpamAssassin::Plugin::WhiteListSubject.3 \
-		Mail::SpamAssassin::PluginHandler.3 \
-		Mail::SpamAssassin::SQLBasedAddrList.3 \
-		Mail::SpamAssassin::SubProcBackChannel.3 \
-		Mail::SpamAssassin::Timeout.3 \
-		Mail::SpamAssassin::Util.3 \
-		Mail::SpamAssassin::Util::DependencyInfo.3 \
-		Mail::SpamAssassin::Util::Progress.3 \
-		Mail::SpamAssassin::Util::RegistrarBoundaries.3 \
-		spamassassin-run.3
-
-MAN1=		spamd.1 spamassassin.1 spamc.1 sa-learn.1 sa-update.1 \
-		spamassassin-run.1 sa-compile.1
-
-DOCSDIR=	${PREFIX}/share/doc/${PKGNAMEPREFIX}${PORTNAME}
-DATADIR=	${PREFIX}/share/spamassassin
-DOCS=		CREDITS Changes INSTALL LICENSE NOTICE PACKAGING README TRADEMARK UPGRADE USAGE procmailrc.example
-DOCSSQL=	README README.awl README.bayes awl_mysql.sql awl_pg.sql bayes_mysql.sql bayes_pg.sql userpref_mysql.sql userpref_pg.sql
-DOCSLDAP=	README README.testing sa_test.ldif
-PORTDOCS=	${DOCS} sql ldap
-
-USE_RC_SUBR=	sa-spamd
-
-.if defined(WITH_MYSQL) || defined(WITH_PGSQL)
+.if ${PORT_OPTIONS:MMYSQL} || ${PORT_OPTIONS:MPGSQL}
 SUB_LIST+=	SQL_FLAG="-Q"
 .else
 SUB_LIST+=	SQL_FLAG=""
 .endif
-.if !defined(WITH_AS_ROOT)
-SUB_LIST+=	RUN_AS_USER="-u spamd -H /var/spool/spamd"
+
+.if empty(PORT_OPTIONS:MAS_ROOT)
+SUB_LIST+=	RUN_AS_USER="-u ${USERS} -H /var/spool/spamd"
 .else
 SUB_LIST+=	RUN_AS_USER=""
 .endif
 
-post-patch:
-	@${FIND} ${WRKSRC} -name \*.orig -delete
-	@${REINPLACE_CMD} -e 's#B_CONFDIR)/local.cf#B_CONFDIR)/local.cf.sample#g' \
-		-e 's#B_CONFDIR)/init.pre#B_CONFDIR)/init.pre.sample#g' \
-		-e 's#B_CONFDIR)/v310.pre#B_CONFDIR)/v310.pre.sample#g' \
-		-e 's#B_CONFDIR)/v312.pre#B_CONFDIR)/v312.pre.sample#g' \
-		-e 's#B_CONFDIR)/v320.pre#B_CONFDIR)/v320.pre.sample#g' \
-		-e 's#B_CONFDIR)/v330.pre#B_CONFDIR)/v330.pre.sample#g' \
+.if ${PORT_OPTIONS:MUPDATE_AND_COMPILE} && empty(PACKAGE_BUILDING) && empty(BATCH)
+PLIST_SUB+=	UPDATE_ON_INSTALL="yes"
+.else
+PLIST_SUB+=	UPDATE_ON_INSTALL="no"
+.endif
+
+post-patch::
+	# The 3.4.0 release notes never made it into the tarball
+	${INSTALL_DATA} ${FILESDIR}/3.4.0-RELEASE-NOTES.txt ${WRKSRC}
+	${REINPLACE_CMD} -e 's,%%DOCSDIR%%,${DOCSDIR},' ${WRKSRC}/UPGRADE
+
+	${REINPLACE_CMD} -e 's,B_CONFDIR)/local.cf,B_CONFDIR)/local.cf.sample,g' \
+		-e 's,B_CONFDIR)/init.pre,B_CONFDIR)/init.pre.sample,g' \
+		-e 's,B_CONFDIR)/v310.pre,B_CONFDIR)/v310.pre.sample,g' \
+		-e 's,B_CONFDIR)/v312.pre,B_CONFDIR)/v312.pre.sample,g' \
+		-e 's,B_CONFDIR)/v320.pre,B_CONFDIR)/v320.pre.sample,g' \
+		-e 's,B_CONFDIR)/v330.pre,B_CONFDIR)/v330.pre.sample,g' \
+		-e 's,B_CONFDIR)/v340.pre,B_CONFDIR)/v340.pre.sample,g' \
 		-e 's/require DBI/0/' \
 		${WRKSRC}/Makefile.PL
-	@${REINPLACE_CMD} -e '/^CC =/d; \
+	${REINPLACE_CMD} -e '/^CC =/d; \
 		s|@SSLCFLAGS@|& $${CFLAGS}|g' ${WRKSRC}/spamc/Makefile.in
 
-.if defined(WITH_RAZOR)
-	${REINPLACE_CMD} -e '/Razor2/s/^#loadplugin/loadplugin/' ${WRKSRC}/rules/v312.pre
-.endif
-.if defined(WITH_RELAY_COUNTRY)
-	${REINPLACE_CMD} -e '/RelayCountry/s/^# ?loadplugin/loadplugin/' ${WRKSRC}/rules/init.pre
-.endif
-.if !defined(WITH_DKIM)
-	${REINPLACE_CMD} -e '/DKIM/s/^loadplugin/#loadplugin/' ${WRKSRC}/rules/v312.pre
-.endif
-.if !defined(WITH_SPF_QUERY)
-	${REINPLACE_CMD} -e '/SPF/s/^loadplugin/#loadplugin/' ${WRKSRC}/rules/init.pre
-.endif
-.if defined(WITH_DCC)
-	${REINPLACE_CMD} -e '/DCC/s/^#loadplugin/loadplugin/' ${WRKSRC}/rules/v310.pre
-.endif
-.if !defined(WITH_AWL)
-	${REINPLACE_CMD} -e '/AWL/s/^loadplugin/#loadplugin/' ${WRKSRC}/rules/v310.pre
-.endif
-.if defined(WITH_SACOMPILE)
-	${REINPLACE_CMD} -e '/Rule2XSBody/s/^# loadplugin/loadplugin/' ${WRKSRC}/rules/v320.pre
-.endif
+.for var in ${OPTIONS_GROUP_PLUGINS} UPDATE_AND_COMPILE
+.  if ${PORT_OPTIONS:M${var}}
+	${REINPLACE_CMD} -e '/${${var}_INITVAR}/s/^\#.*loadplugin/loadplugin/' ${WRKSRC}/rules/*.pre
+.  else
+	${REINPLACE_CMD} -e '/${${var}_INITVAR}/s/^loadplugin/\# loadplugin/' ${WRKSRC}/rules/*.pre
+.  endif
+.endfor
 
+	${FIND} ${WRKSRC} -name '*.orig' -or -name '*.bak' | ${XARGS} ${RM}
+
 pre-install:
-	@${MKDIR}  ${DATADIR}
-
-post-build:
-	@(cd ${BUILD_WRKSRC}; ${SETENV} ${MAKE_ENV} ${MAKE} ${MAKE_FLAGS} ${MAKEFILE} ${MAKE_ARGS} spamc/libspamc.so)
-.if !defined(WITHOUT_SSL)
-	@(cd ${BUILD_WRKSRC}; ${SETENV} ${MAKE_ENV} ${MAKE} ${MAKE_FLAGS} ${MAKEFILE} ${MAKE_ARGS} spamc/libsslspamc.so)
+	@${MKDIR} ${STAGEDIR}${DATADIR}
+	${INSTALL_LIB} ${WRKSRC}/spamc/libspamc.so ${STAGEDIR}${PREFIX}/lib/libspamc.so.0
+	${LN} -sf libspamc.so.0 ${STAGEDIR}${PREFIX}/lib/libspamc.so
+.if ${PORT_OPTIONS:MSSL}
+	${INSTALL_LIB} ${WRKSRC}/spamc/libsslspamc.so ${STAGEDIR}${PREFIX}/lib/libsslspamc.so.0
+	${LN} -sf libsslspamc.so.0 ${STAGEDIR}${PREFIX}/lib/libsslspamc.so
 .endif
+	${INSTALL_DATA} ${WRKSRC}/spamc/libspamc.h ${STAGEDIR}${PREFIX}/include
 
-pre-su-install:
-	@${SH} ${PKGINSTALL} ${PKGNAME} PRE-INSTALL
-	@${INSTALL_PROGRAM} ${WRKSRC}/spamc/libspamc.so ${PREFIX}/lib/libspamc.so.0
-	@${LN} -sf libspamc.so.0 ${PREFIX}/lib/libspamc.so
-.if !defined(WITHOUT_SSL)
-	@${INSTALL_PROGRAM} ${WRKSRC}/spamc/libsslspamc.so ${PREFIX}/lib/libsslspamc.so.0
-	@${LN} -sf libsslspamc.so.0 ${PREFIX}/lib/libsslspamc.so
-.endif
-	@${INSTALL_DATA} ${WRKSRC}/spamc/libspamc.h ${PREFIX}/include
+post-install::
+	${STRIP_CMD} ${STAGEDIR}${PREFIX}/bin/spamc
+	@${MKDIR} ${STAGEDIR}/var/lib/spamassassin ${STAGEDIR}${DBDIR}/spamassassin ${STAGEDIR}/var/run/spamd
+	@${MKDIR} ${STAGEDIR}${DOCSDIR}
+	${INSTALL_DATA} ${DOCS:S|^|${WRKSRC}/|} ${STAGEDIR}${DOCSDIR}
+	(cd ${WRKSRC} && ${COPYTREE_SHARE} "sql ldap" ${STAGEDIR}${DOCSDIR})
 
-post-install:
-.if defined (WITH_SPAMC)
-	@${STRIP_CMD} ${PREFIX}/bin/spamc
-.endif
-	@[ -f ${PREFIX}/etc/mail/spamassassin/init.pre ] || \
-		${CP} ${PREFIX}/etc/mail/spamassassin/init.pre.sample \
-			${PREFIX}/etc/mail/spamassassin/init.pre
-	@[ -f ${PREFIX}/etc/mail/spamassassin/v310.pre ] || \
-		${CP} ${PREFIX}/etc/mail/spamassassin/v310.pre.sample \
-			${PREFIX}/etc/mail/spamassassin/v310.pre
-	@[ -f ${PREFIX}/etc/mail/spamassassin/v312.pre ] || \
-		${CP} ${PREFIX}/etc/mail/spamassassin/v312.pre.sample \
-			${PREFIX}/etc/mail/spamassassin/v312.pre
-	@[ -f ${PREFIX}/etc/mail/spamassassin/v320.pre ] || \
-		${CP} ${PREFIX}/etc/mail/spamassassin/v320.pre.sample \
-			${PREFIX}/etc/mail/spamassassin/v320.pre
-	@PKG_PREFIX=${PREFIX} BATCH=${BATCH} SU_CMD="${SU_CMD}" ${SH} ${PKGDIR}/pkg-install ${PKGNAME} POST-INSTALL
-	@[ -f ${PREFIX}/etc/mail/spamassassin/v330.pre ] || \
-		${CP} ${PREFIX}/etc/mail/spamassassin/v330.pre.sample \
-			${PREFIX}/etc/mail/spamassassin/v330.pre
-
-.if !defined(NOPORTDOCS)
-	@${MKDIR} ${DOCSDIR} ${DOCSDIR}/sql ${DOCSDIR}/ldap
-	@${INSTALL_DATA} ${DOCS:S|^|${WRKSRC}/|} ${DOCSDIR}
-	@${INSTALL_DATA} ${DOCSSQL:S|^|${WRKSRC}/sql/|} ${DOCSDIR}/sql
-	@${INSTALL_DATA} ${DOCSLDAP:S|^|${WRKSRC}/ldap/|} ${DOCSDIR}/ldap
-
-.endif
-	@${SED} -e 's#PREFIX#${PREFIX}#' ${PKGMESSAGE}
-
 .include <bsd.port.post.mk>

Modified: trunk/mail/spamassassin/distinfo
===================================================================
--- trunk/mail/spamassassin/distinfo	2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/distinfo	2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,2 +1,2 @@
-SHA256 (Mail-SpamAssassin-3.3.2.tar.gz) = 5323038939a0ef9fc97d5264defce3ae1d95e98b3a94c4c3b583341c927f32df
-SIZE (Mail-SpamAssassin-3.3.2.tar.gz) = 1208182
+SHA256 (Mail-SpamAssassin-3.4.0.tar.gz) = 244914c30976844878a7f129fd503eb40986c68a3800f416c3a68b14507c0a64
+SIZE (Mail-SpamAssassin-3.4.0.tar.gz) = 1269753

Added: trunk/mail/spamassassin/files/3.4.0-RELEASE-NOTES.txt
===================================================================
--- trunk/mail/spamassassin/files/3.4.0-RELEASE-NOTES.txt	                        (rev 0)
+++ trunk/mail/spamassassin/files/3.4.0-RELEASE-NOTES.txt	2014-09-12 01:45:46 UTC (rev 16990)
@@ -0,0 +1,461 @@
+To: users, dev, announce
+Subject: ANNOUNCE: Apache SpamAssassin 3.4.0 available
+
+Release Notes -- Apache SpamAssassin -- Version 3.4.0
+
+Introduction
+------------
+
+This is a major release.  It introduces over two years of bug fixes and
+features since the release of SpamAssassin 3.3.2 on June 16, 2011.
+3.4.0 includes the Bayes Redis (http://redis.io/) back-end (bug 6879),
+EDNS0 changes (bug 6910), native IPv6 support, numerous URIBL.pm changes
+or features and a small API change in libspamc (bug 6562) with many other
+subtle changes.
+
+SpamAssassin was tested on perl 5.18.2, and (out of curiosity) also
+on a Raspberry Pi (ARM6, Raspbian / Debian 7.2 Wheezy, perl 5.14.2)
+... yes, it is 20 times slower compared to i7-960 CPU, but all tests 
+pass!
+
+Overall, this release has been tested on many production-level
+environments for nearly a year, including testing on an IPv6-only host.
+It is highly recommended and stable.
+
+NOTE: Complete changes are available at
+http://svn.apache.org/repos/asf/spamassassin/branches/3.4/Changes
+
+
+Notable Sendmail Bug
+--------------------
+
+Sendmail 8.14.5 and below contain a canonicalization misfeature / bug
+that can cause DKIM failures.
+See https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6462.
+
+
+Compatibility with version 3.3.2
+--------------------------------
+
+* DNS queries generated by SpamAssassin now enable option EDNS0 in query
+packets and specify a buffer size of 4096 bytes by default. This allows
+DNS replies larger than 512 bytes to be returned in one UDP datagram, 
+avoiding a need for re-issuing a failed query over a TCP protocol. This
+default setting is well suited if a DNS resolver (i.e. a recursive DNS
+server) is located on the same LAN as a host running SpamAssassin, which
+is the usual setup for all but perhaps some home uses of SpamAssassin.
+
+The option should be disabled (by 'dns_options noedns0') when a recursive
+DNS server is only reachable through some old-fashioned firewall or through
+some picky router with deep packet inspection which bans DNS UDP messages
+larger than 512 bytes, or blocks fragmented UDP datagrams.
+
+The 'dns_options' setting is documented in Mail::SpamAssassin::Conf POD
+or man page, more details in bug 6910 and bug 6862.
+
+
+* A default setting for option 'dns_available' was changed from 'test' to
+'yes' (bug 6770, bug 6769), so SpamAssassin now assumes by default that
+it is running on a host with an internet connection and a working DNS
+resolver. If this is not the case, please configure this option explicitly.
+
+The change avoids surprises on an otherwise well connected host which may
+experience a temporary DNS unavailability at the system startup time or a
+temporary network outage when spamd was starting, and the initial failed
+test would disable DNS queries permanently. The option is documented in
+the Mail::SpamAssassin::Conf POD or man page.
+
+
+* When Bayes classification is in use and messages are 'learned' as spam
+or ham and stored in a database, the Bayes plugin generates internal
+message IDs of learned messages and stores them in a 'seen' database to
+avoid re-learning duplicates and accidental un-learning messages that
+were not previously learned. With changes in bug 5185, the calculation
+of message IDs in a bayes 'seen' database has changed, so new code can
+no longer associate new messages with those learned before the change.
+
+Note that this change does not affect recognition of old tokens and the
+classification algorithm, only duplicate detection and unlearning of old
+messages is affected.
+
+Because of this change, if you use Bayes and you are upgrading from a
+version prior to 3.4.0, you may consider wiping your Bayes database
+and starting fresh.
+
+However, this is not mandatory.  If you choose to keep your current
+database tokens, these are the ramifications:
+
+1 - If you re-process emails that have already been learned before,
+    it will create duplicate entries because of the new msg_id format.
+    The duplicates will expire, eventually, and should cause minimal
+    impact unless it occurs frequently.
+
+2 - If you try and unlearn or reclassify an email processed prior to the
+    upgrade, the system will be unable to do so because of the new msg_id 
+    format. If unlearning a message (that was learned before the change)
+    is important, consider just clearing your Bayes store and starting
+    from scratch.
+
+
+Dependency changes since version 3.3.2
+--------------------------------------
+
+Dependency on the following Perl modules were dropped: Net::Ident,
+IP::Country::Fast and IP::Country.
+
+Dependency on a perl module LWP::UserAgent as used by sa-update is now
+made optional if any of programs curl, wget, or fetch are available.
+
+New optional dependencies on the following Perl modules were introduced:
+
+- new optional dependency on Geo::IP in a RelayCountry plugin (bug 6599);
+  for backward compatibility IP::Country::Fast is used if Geo::IP is
+  not installed
+
+- new optional dependency on IO::Socket::IP for a cleaner IP support
+  regardless of a protocol family (IPv4 and IPv6)
+
+- new optional dependency on Net::Patricia to speed up lookups on
+  internal_networks, trusted_networks or msa_networks when these lists
+  contain a larger number of entries
+
+- new optional dependency on programs curl, wget, or a FreeBSD fetch.
+  sa-update will use any of these external programs to download rule
+  updates, either over IPv6 or over IPv4. Any of these three programs
+  suffices - the installation procedure is currently unclear on this,
+  its warning may be understood as if all three programs are needed,
+  which is not the case
+
+- minimal required version of NetAddr::IP was bumped to 4.010
+
+
+Internal changes potentially affecting third party software
+using Mail::SpamAssassin library
+-----------------------------------------------------------
+
+A caller is now given a choice of calling srand() by itself (e.g. before
+forking) or let a SpamAssassin library do it as before. Avoiding redundant
+initialization of a perl's random number generator can prevent unnecessary
+entropy loss. It is controlled by option skip_prng_reseeding in a call
+to Mail::SpamAssassin::new(). The change was documented in bug 6690.
+
+The Mail::SpamAssassin::parser can now accept a message also as a string
+reference, avoiding one copy in memory. Documented in bug 6686.
+
+A caller may pass the original mail body size to Mail::SpamAssassin::parse
+through the suppl_attrib argument's field 'body_size'. This mail body size
+is accessible to the eval rule check_body_length. It can be useful when a
+caller only passes a truncated message to SpamAssassin. Documented in bug
+6830.
+
+A new plugin callback "prefork_init" was introduced, which should be called
+by a master process (e.g. spamd) before forking multiple child processes.
+For compatibility this call is currently optional, but recommended for new
+versions. Currently only a Redis backend for Bayes checks will benefit from
+being notified before a fork. Documented in bug 6942.
+
+
+Notable bug fixes
+-----------------
+
+The sa-update program now avoids repeatedly downloading same rules if
+subsequent unpacking of rules and updating fails. Documented in bug 6655.
+
+Several incompatibilities with newer versions of a perl module Net::DNS
+as used by sa-update and by the SpamAssassin library were fixed.
+See Net::DNS problem [rt.cpan.org #83451].
+
+A perl module Razor agent clobbers entropy of a random number generator by
+re-initializing the generator on every call. The SpamAssassin Razor plugin
+now provides a workaround, preserving entropy across calls to Razor2 agent.
+
+A workaround in BayesStore/MySQL.pm was added for a MySQL server bug,
+see http://bugs.mysql.com/bug.php?id=46675 .
+
+Documentation was fixed: trailing dots in DNSBL zone names are not required
+since version 3.1.0 of Mail::SpamAssassin (September 2005).
+
+
+Notable features:
+=================
+
+Redis database backend for a Bayes database
+-------------------------------------------
+
+In addition to existing backends, the 3.4.0 introduces support for keeping
+a Bayes database on a Redis server, either running locally, or accessed
+over network. Similar to SQL backends, the database may be concurrently
+used by several hosts running SpamAssassin.
+
+The current implementation only supports a global Bayes database, i.e.
+per-recipient sub-databases are not supported. The Redis 2.6.* server
+supports access over IPv4 or over a Unix socket, starting with version
+2.8.0 also IPv6 is supported. Bear in mind that Redis server only offers
+limited access controls, so it is advisable to let the Redis server bind
+to a loopback interface only, or to use other mechanisms to limit access,
+such as local firewall rules.
+
+The Redis backend for Bayes can put a Lua scripting support in a Redis
+server to good use, improving performance. The Lua support is available
+in Redis server since version 2.6.  In absence of a Lua support, the Redis
+backend uses batched (pipelined) traditional Redis commands, so it should
+work with a Redis server version 2.4 (untested), although this is not
+recommended for busy sites.
+
+Expiration of token and 'seen' message id entries is left to the Redis
+server. There is no provision for manually expiring a database, so it is
+highly recommended to leave the setting bayes_auto_expire to its default
+value 1 (i.e. enabled).
+
+Example configuration:
+
+  bayes_store_module  Mail::SpamAssassin::BayesStore::Redis
+  bayes_sql_dsn       server=127.0.0.1:6379;password=foo;database=2
+  bayes_token_ttl 21d
+  bayes_seen_ttl   8d
+  bayes_auto_expire 1
+
+
+Improved support for IPv6
+-------------------------
+
+The rules-updating program sa-update and its infrastructure is now usable
+over either IPv4 or IPv6, including from an IPv6-only hosts (bug 6654).
+
+SpamAssassin is now usable on an IPv6-only host: affects installation,
+self-tests, rule updates, client, server, and a command-line spamassassin.
+
+Command line options -4 and -6 were added to prefer/choose/force IPv4 or
+IPv6 in programs spamassassin, spamd, spamc, and sa-update.
+
+Command line options --listen and --allowed-ips in spamd can now accept
+IPv6 addresses.
+
+Preferably a perl module IO::Socket::IP is used (if it is available) for
+network communication regardless of a protocol family - for DNS queries,
+by spamd server side, and by a client code in Mail::SpamAssassin::Client.
+As a fallback when the module IO::Socket::IP is unavailable, an older
+module IO::Socket::INET6 is used, or eventually the IO::Socket::INET is
+used as last resort.
+
+If spamd fails to start with an 'Address already in use' message, please
+install perl module IO::Socket::IP, or deintall IO::Socket::INET6, or
+specify a socket bind address explicitly with a spamd --listen option.
+See bug 6953 for details.
+
+The spamd server can now simultaneously listen on multiple sockets,
+possibly in different protocol domains (Unix sockets, INET or INET6
+protocol families.
+
+DnsResolver was updated allowing it to work on an IPv6-only host (bug 6653)
+
+A plugin RelayCountry now uses module Geo::IP and its database of IPv6
+addresses GEOIP_COUNTRY_EDITION_V6 when available.
+
+The following configuration options were extended to accept IPv6 addresses:
+dns_server, trusted_networks, internal_networks, msa_networks, (but not yet
+the whitelist_from_rcvd), and their defaults were adjusted accordingly.
+
+The parser code of Received header fields can now deal with IPv6 addresses
+in a mail header section.
+
+The AutoWhitelist plugin was updated and can now deal with IPv6 addresses.
+
+Installation unit tests were updated to prevent them from failing on an
+IPv6-only host.
+
+
+New command-line options
+------------------------
+
+New command-line option for spamd: added an option --listen (or -i),
+which can be specified multiple times and allows spamd to accept requests
+over multiple INET (IPv4) or INET6 (IPv6) or UNIX sockets. See bug 6841,
+and see also option --port.
+
+New command-line option for spamc: -X (or --unavailable-tempfail) allows
+spamc to return EX_TEMPFAIL instead of EX_UNAVAILABLE when using option -x.
+
+As already noted in the 'Improved support for IPv6' section, options -4
+and -6 were added to programs spamassassin, spamd, spamc, and sa-update.
+
+The sa-update utility can now take multiple -v or --verbose options to
+increase verbosity.
+
+The sa-learn command has a new option --max-size .
+
+
+New configuration options
+-------------------------
+
+Plugin/URIDNSBL: new tflags options 'a' and 'ns' were introduced. They are
+documented in the Mail::SpamAssassin::Plugin::URIDNSBL POD or man page.
+
+Plugin/AutoLearnThreshold: new option autolearn_force was added. It is
+documented in the Mail::SpamAssassin::Plugin::AutoLearnThreshold POD or
+man page.
+
+Plugin/ASN: new options asn_prefix and clear_asn_lookups were added.
+They are documented in Mail::SpamAssassin::Plugin::ASN POD or man page.
+
+
+The following new options, as implemented by various plugins or by
+other modules, are all documented in the Mail::SpamAssassin::Conf POD
+or man page:
+
+- Plugin/WLBLEval: new configuration options were added: enlist_uri_host,
+delist_uri_host, with shorthands blacklist_uri_host and whitelist_uri_host
+and an associated eval rule check_uri_host_listed.
+
+- Configuration options dns_query_restriction (allow|deny) and
+clear_dns_query_restriction were added (bug 6884).
+
+- A 'dns_options' setting accepts new sub-options 'dns0x20' and 'edns'.
+
+- Added option 'dns_server' which specifies an IP address of a recursive
+DNS server (i.e. DNS resolver) and optionally its port number.
+
+- Added options dns_local_ports_permit, dns_local_ports_avoid and
+dns_local_ports_none to control source port local ranges available to
+DNS queries
+
+- Added the following sub-options to the tflags setting: autolearn_force,
+maxhits=N, ips_only, domains_only, a, ns.
+
+- The option whitelist_from_rcvd can now take an IP address as its second
+argument (instead of a domain name), which can be useful for whitelisting
+a sending mailer which has no reverse DNS mapping.
+
+
+
+ArchiveIterator has new options opt_max_size and opt_from_regex. They are
+documented in Mail::SpamAssassin::ArchiveIterator POD or man page.
+
+A new tag (macro) _RULESVERSION_ was added. It expands to a comma-separated
+list of rules versions, retrieved from an '# UPDATE version' comment in
+rules files and can be used in an 'add_header' configuration setting.
+
+
+New plugins
+-----------
+
+A new plugin AskDNS was introduced.
+
+Using a DNS query template as specified in a parameter of an askdns rule,
+the plugin replaces tag names as found in the template with their values
+and launches DNS queries as soon as tag values become available. When DNS
+responses trickle in, filters them according to the requested DNS resource
+record type and an optional subrule filtering expression, yielding a rule
+hit if a response meets filtering conditions.
+
+
+Optimizations
+-------------
+
+Several smaller performance optimizations were introduced, among others:
+bug 6508 (uses Net::Patricia if available), bug 6854 (base64 attachments),
+bug 6915 (get_tag speedup).
+
+The DNS client code module now caches queries and replies for the duration
+of processing one mail message. Duplicate DNS queries by different rules
+which happen to query the same DNS resource are now avoided.
+
+
+
+Downloading and availability
+----------------------------
+
+Downloads are available from:
+
+http://spamassassin.apache.org/downloads.cgi
+
+md5sum of archive files:
+
+46e99adc0affebbe5f3524b4834e0345  Mail-SpamAssassin-3.4.0.tar.bz2
+5d0b50cee3bfa905cca35c33296c8c2a  Mail-SpamAssassin-3.4.0.tar.gz
+088a9b9bf7f3d93350f8c8920cbd2fe6  Mail-SpamAssassin-3.4.0.zip
+9c15df55e9ec2a3c8376f3e15e448a2e  Mail-SpamAssassin-rules-3.4.0.r1565117.tgz
+
+sha1sum of archive files:
+
+5bc66cd599cbe6a38a127d7813d4abc8af03b667  Mail-SpamAssassin-3.4.0.tar.bz2
+4dac1384282b6201f7d80cea8295933ef08e7e28  Mail-SpamAssassin-3.4.0.tar.gz
+3fa7715fb4c8b558b5fbc2e5a1288a751d8d12e3  Mail-SpamAssassin-3.4.0.zip
+d71a64cab9f5454d3b164e44d3649bff9cb87f87  Mail-SpamAssassin-rules-3.4.0.r1565117.tgz
+
+Note that the *-rules-*.tar.gz files are only necessary if you cannot,
+or do not wish to, run "sa-update" after install to download the latest
+fresh rules.
+
+See the INSTALL and UPGRADE files in the distribution for important
+installation notes.
+
+
+GPG Verification Procedure
+--------------------------
+The release files also have a .asc accompanying them.  The file serves
+as an external GPG signature for the given release file.  The signing
+key is available via the wwwkeys.pgp.net key server, as well as
+http://www.apache.org/dist/spamassassin/KEYS
+
+The key information is:
+
+pub   4096R/F7D39814 2009-12-02
+       Key fingerprint = D809 9BC7 9E17 D7E4 9BC2  1E31 FDE5 2F40 F7D3 9814
+uid                  SpamAssassin Project Management Committee <private at spamassassin.apache.org>
+uid                  SpamAssassin Signing Key (Code Signing Key, replacement for 1024D/265FA05B) <dev at spamassassin.apache.org>
+sub   4096R/7B3265A5 2009-12-02
+
+To verify a release file, download the file with the accompanying .asc file and run the following commands:
+
+  gpg -v --keyserver wwwkeys.pgp.net --recv-key F7D39814
+  gpg --verify Mail-SpamAssassin-3.4.0.tar.bz2.asc
+  gpg --fingerprint F7D39814
+
+Then verify that the key matches the signature.
+
+Note that older versions of gnupg may not be able to complete the steps
+above. Specifically, GnuPG v1.0.6, 1.0.7 & 1.2.6 failed while v1.4.11
+worked flawlessly.
+
+See http://www.apache.org/info/verification.html for more information
+on verifying Apache releases.
+
+
+About Apache SpamAssassin
+-------------------------
+
+Apache SpamAssassin is a mature, widely-deployed open source project
+that serves as a mail filter to identify spam. SpamAssassin uses a
+variety of mechanisms including mail header and text analysis, Bayesian
+filtering, DNS blocklists, and collaborative filtering databases. In
+addition, Apache SpamAssassin has a modular architecture that allows
+other technologies to be quickly incorporated as an addition or as a
+replacement for existing methods.
+
+Apache SpamAssassin typically runs on a server, classifies and labels
+spam before it reaches your mailbox, while allowing other components of
+a mail system to act on its results.
+
+Most of the Apache SpamAssassin is written in Perl, with heavily
+traversed code paths carefully optimized. Benefits are portability,
+robustness and facilitated maintenance. It can run on a wide variety of
+POSIX platforms.
+
+The server and the Perl library feels at home on Unix and Linux
+platforms, and reportedly also works on MS Windows systems under ActivePerl.
+
+For more information, visit http://spamassassin.apache.org/
+
+
+About The Apache Software Foundation
+------------------------------------
+
+Established in 1999, The Apache Software Foundation provides
+organizational, legal, and financial support for more than 100
+freely-available, collaboratively-developed Open Source projects. The
+pragmatic Apache License enables individual and commercial users to
+easily deploy Apache software; the Foundation's intellectual property
+framework limits the legal exposure of its 2,500+ contributors.
+
+For more information, visit http://www.apache.org/

Deleted: trunk/mail/spamassassin/files/manpages
===================================================================
--- trunk/mail/spamassassin/files/manpages	2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/files/manpages	2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,71 +0,0 @@
-# $FreeBSD$
-MAN3+=		Mail::SpamAssassin.3 \
-		Mail::SpamAssassin::AICache.3 \
-		Mail::SpamAssassin::ArchiveIterator.3 \
-		Mail::SpamAssassin::AsyncLoop.3 \
-		Mail::SpamAssassin::AutoWhitelist.3 \
-		Mail::SpamAssassin::Bayes.3 \
-		Mail::SpamAssassin::BayesStore.3 \
-		Mail::SpamAssassin::BayesStore::BDB.3 \
-		Mail::SpamAssassin::BayesStore::MySQL.3 \
-		Mail::SpamAssassin::BayesStore::PgSQL.3 \
-		Mail::SpamAssassin::BayesStore::SQL.3 \
-		Mail::SpamAssassin::Client.3 \
-		Mail::SpamAssassin::Conf.3 \
-		Mail::SpamAssassin::Conf::LDAP.3 \
-		Mail::SpamAssassin::Conf::Parser.3 \
-		Mail::SpamAssassin::Conf::SQL.3 \
-		Mail::SpamAssassin::DnsResolver.3 \
-		Mail::SpamAssassin::Logger.3 \
-		Mail::SpamAssassin::Logger::File.3 \
-		Mail::SpamAssassin::Logger::Stderr.3 \
-		Mail::SpamAssassin::Logger::Syslog.3 \
-		Mail::SpamAssassin::Message.3 \
-		Mail::SpamAssassin::Message::Metadata.3 \
-		Mail::SpamAssassin::Message::Node.3 \
-		Mail::SpamAssassin::PerMsgLearner.3 \
-		Mail::SpamAssassin::PerMsgStatus.3 \
-		Mail::SpamAssassin::PersistentAddrList.3 \
-		Mail::SpamAssassin::Plugin.3 \
-		Mail::SpamAssassin::Plugin::ASN.3 \
-		Mail::SpamAssassin::Plugin::AWL.3 \
-		Mail::SpamAssassin::Plugin::AccessDB.3 \
-		Mail::SpamAssassin::Plugin::AntiVirus.3 \
-		Mail::SpamAssassin::Plugin::AutoLearnThreshold.3 \
-		Mail::SpamAssassin::Plugin::Bayes.3 \
-		Mail::SpamAssassin::Plugin::BodyRuleBaseExtractor.3 \
-		Mail::SpamAssassin::Plugin::Check.3 \
-		Mail::SpamAssassin::Plugin::DCC.3 \
-		Mail::SpamAssassin::Plugin::DKIM.3 \
-		Mail::SpamAssassin::Plugin::Hashcash.3 \
-		Mail::SpamAssassin::Plugin::MIMEHeader.3 \
-		Mail::SpamAssassin::Plugin::OneLineBodyRuleType.3 \
-		Mail::SpamAssassin::Plugin::PhishTag.3 \
-		Mail::SpamAssassin::Plugin::Pyzor.3 \
-		Mail::SpamAssassin::Plugin::Razor2.3 \
-		Mail::SpamAssassin::Plugin::RelayCountry.3 \
-		Mail::SpamAssassin::Plugin::ReplaceTags.3 \
-		Mail::SpamAssassin::Plugin::Reuse.3 \
-		Mail::SpamAssassin::Plugin::Rule2XSBody.3 \
-		Mail::SpamAssassin::Plugin::SPF.3 \
-		Mail::SpamAssassin::Plugin::Shortcircuit.3 \
-		Mail::SpamAssassin::Plugin::SpamCop.3 \
-		Mail::SpamAssassin::Plugin::Test.3 \
-		Mail::SpamAssassin::Plugin::TextCat.3 \
-		Mail::SpamAssassin::Plugin::URIDNSBL.3 \
-		Mail::SpamAssassin::Plugin::URIDetail.3 \
-		Mail::SpamAssassin::Plugin::VBounce.3 \
-		Mail::SpamAssassin::Plugin::WhiteListSubject.3 \
-		Mail::SpamAssassin::PluginHandler.3 \
-		Mail::SpamAssassin::SQLBasedAddrList.3 \
-		Mail::SpamAssassin::SubProcBackChannel.3 \
-		Mail::SpamAssassin::Timeout.3 \
-		Mail::SpamAssassin::Util.3 \
-		Mail::SpamAssassin::Util::DependencyInfo.3 \
-		Mail::SpamAssassin::Util::Progress.3 \
-		Mail::SpamAssassin::Util::RegistrarBoundaries.3 \
-		spamassassin-run.3
-
-MAN1+=		spamd.1 spamassassin.1 spamc.1 sa-learn.1 sa-update.1 \
-		spamassassin-run.1 sa-compile.1 sa-awl.1
-

Added: trunk/mail/spamassassin/files/patch-UPGRADE
===================================================================
--- trunk/mail/spamassassin/files/patch-UPGRADE	                        (rev 0)
+++ trunk/mail/spamassassin/files/patch-UPGRADE	2014-09-12 01:45:46 UTC (rev 16990)
@@ -0,0 +1,12 @@
+--- UPGRADE.orig	2014/02/11 16:54:00	1567218
++++ UPGRADE	2014/02/11 16:55:08	1567219
+@@ -1,3 +1,9 @@
++Note for Users Upgrading to SpamAssassin 3.4.0
++----------------------------------------------
++- Please see the Announcement file at:
++   http://svn.apache.org/repos/asf/spamassassin/branches/3.4/build/announcements/3.4.0.txt
++   or %%DOCSDIR%%/3.4.0-RELEASE-NOTES.txt
++
+ Note for Users Upgrading to SpamAssassin 3.3.0
+ -----------------------------------------------
+ 

Deleted: trunk/mail/spamassassin/files/patch-bug6624
===================================================================
--- trunk/mail/spamassassin/files/patch-bug6624	2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/files/patch-bug6624	2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,88 +0,0 @@
---- lib/Mail/SpamAssassin/BayesStore/MySQL.pm	(revision 1138970)
-+++ lib/Mail/SpamAssassin/BayesStore/MySQL.pm	(working copy)
-@@ -840,14 +840,28 @@
-       return 0;
-     }
- 
-+    # With ON DUPLICATE KEY UPDATE, the affected-rows value per row is 1 if
-+    # the row is inserted as a new row and 2 if an existing row is updated.
-+    #
-+    # Due to a MySQL server bug a value of 3 can be seen.
-+    # See: http://bugs.mysql.com/bug.php?id=46675
-+    #   When executing the INSERT ... ON DUPLICATE KEY UPDATE statement
-+    #   and checking the rows return count:
-+    #   mysql_client_found_rows = 0: The second INSERT returns a row count
-+    #                                of 2 in all MySQL versions.
-+    #   mysql_client_found_rows = 1: The second INSERT returns this row count:
-+    #     Before MySQL 5.1.20: 2
-+    #     MySQL 5.1.20: undef on Mac OS X, 139775481 on Linux (garbage?)
-+    #     MySQL 5.1.21 and up: 3
-+    #
-     my $num_rows = $rc;
- 
-     $sth->finish();
- 
--    if ($num_rows == 1 || $num_rows == 2) {
-+    if ($num_rows == 1 || $num_rows == 2 || $num_rows == 3) {
-       my $token_count_update = '';
-       
--      $token_count_update = "token_count = token_count + 1," if ($num_rows == 1);
-+      $token_count_update = "token_count = token_count + 1," if $num_rows == 1;
-       $sql = "UPDATE bayes_vars SET
-                      $token_count_update
-                      newest_token_age = GREATEST(newest_token_age, ?),
-@@ -872,7 +886,11 @@
-     }
-     else {
-       # $num_rows was not what we expected
--      dbg("bayes: _put_token: Updated an unexpected number of rows.");
-+      my $token_displ = $token;
-+      $token_displ =~ s/(.)/sprintf('%02x',ord($1))/egs;
-+      dbg("bayes: _put_token: Updated an unexpected number of rows: %s, ".
-+          "id: %s, token (hex): %s",
-+          $num_rows, $self->{_userid}, $token_displ);
-       $self->{_dbh}->rollback();
-       return 0;
-     }
-@@ -987,8 +1005,24 @@
-       else {
- 	my $num_rows = $rc;
- 
--	$need_atime_update_p = 1 if ($num_rows == 1 || $num_rows == 2);
--	$new_tokens++ if ($num_rows == 1);
-+        # With ON DUPLICATE KEY UPDATE, the affected-rows value per row is 1 if
-+        # the row is inserted as a new row and 2 if an existing row is updated.
-+        # But see MySQL bug (as above): http://bugs.mysql.com/bug.php?id=46675
-+
-+        if ($num_rows == 1) {
-+          $new_tokens++;
-+          $need_atime_update_p = 1;
-+        } elsif ($num_rows == 2 || $num_rows == 3) {
-+          $need_atime_update_p = 1;
-+        } else {
-+          # $num_rows was not what we expected
-+          my $token_displ = $token;
-+          $token_displ =~ s/(.)/sprintf('%02x',ord($1))/egs;
-+          dbg("bayes: _put_tokens: Updated an unexpected number of rows: %s, ".
-+              "id: %s, token (hex): %s",
-+              $num_rows, $self->{_userid}, $token_displ);
-+          $error_p = 1;
-+        }
-       }
-     }
- 
-@@ -1026,10 +1060,10 @@
-       }
-     }
-     else {
--      # $num_rows was not what we expected
--      dbg("bayes: _put_tokens: Updated an unexpected number of rows.");
--      $self->{_dbh}->rollback();
--      return 0;
-+      info("bayes: _put_tokens: no atime updates needed?  Num of tokens: %d",
-+           scalar keys %{$tokens});
-+#     $self->{_dbh}->rollback();
-+#     return 0;
-     }
-   }
- 

Deleted: trunk/mail/spamassassin/files/patch-bug6655
===================================================================
--- trunk/mail/spamassassin/files/patch-bug6655	2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/files/patch-bug6655	2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,50 +0,0 @@
-$FreeBSD$
-
-https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6655
-
---- lib/Mail/SpamAssassin/Util.pm	2011-06-06 19:59:17.000000000 -0400
-+++ lib/Mail/SpamAssassin/Util.pm	2011-08-26 17:12:19.000000000 -0400
-@@ -1025,6 +1024,8 @@
-     return;
-   }
- 
-+  opendir(my $dh, $tmpdir) || die "Could not open $tmpdir: $!";
-+  closedir $dh;
-   my ($reportfile, $tmpfile);
-   my $umask = umask 077;
- 
-@@ -1052,7 +1053,10 @@
- 
-     # ensure the file handle is not semi-open in some way
-     if ($tmpfile) {
--      close $tmpfile  or info("error closing $reportfile: $!");
-+      if (! close $tmpfile) {
-+       info("error closing $reportfile: $!");
-+       $tmpfile=undef;
-+      }
-     }
-   }
-
---- sa-update.raw    2011-06-24 13:38:50.000000000 -0400
-+++ sa-update.raw    2011-08-29 09:38:50.000000000 -0400
-@@ -677,9 +677,9 @@
- 
-   # Write the content out to a temp file for GPG/Archive::Tar interaction
-   dbg("channel: populating temp content file");
--  open(TMP, ">$content_file") || die "fatal: can't write to content temp file $content_file: $!\n";
-+  open(TMP, ">$content_file") || die "fatal: couldn't create content temp file $content_file: $!\n";
-   binmode TMP;
--  print TMP $content;
-+  print TMP $content || die "fatal: can't write to content temp file $content_file: $!\n";
-   close(TMP);
- 
-   # to sign  : gpg -bas file
-@@ -695,7 +695,7 @@
-       die "fatal: couldn't create temp file for GPG signature: $!\n";
-     }
-     binmode $tfh;
--    print $tfh $GPG;
-+    print $tfh $GPG || die "fatal: can't write temp file for GPG signature: $!\n";
-     close($tfh);
- 
-     dbg("gpg: calling gpg");

Deleted: trunk/mail/spamassassin/files/patch-bug6698
===================================================================
--- trunk/mail/spamassassin/files/patch-bug6698	2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/files/patch-bug6698	2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,1471 +0,0 @@
---- lib/Mail/SpamAssassin/Plugin/DCC.pm	2011-06-06 19:59:17.000000000 -0400
-+++ lib/Mail/SpamAssassin/Plugin/DCC.pm	2011-11-26 07:22:36.000000000 -0500
-@@ -15,6 +15,20 @@
- # limitations under the License.
- # </@LICENSE>
- 
-+# Changes since SpamAssassin 3.3.2:
-+#   support for DCC learning.  See dcc_learn_score.
-+#   deal with orphan dccifd sockets
-+#   use `cdcc -q` to not stall waiting to find a DCC server when deciding
-+#     whether DCC checks are enabled
-+#   use dccproc -Q or dccifd query if a pre-existing X-DCC header shows
-+#     the message has already been reported
-+#   dccproc now uses -w /var/dcc/whiteclnt so it acts more like dccifd
-+#   warn about the use of ancient versions of dccproc and dccifd
-+#   turn off dccifd greylisting
-+#   query instead of reporting mail messages that contain X-DCC headers and
-+#     and so has probably already been reported
-+#   try harder to find dccproc and cdcc when not explicitly configured
-+
- =head1 NAME
- 
- Mail::SpamAssassin::Plugin::DCC - perform DCC check of messages
-@@ -30,30 +44,31 @@
- 
- The DCC or Distributed Checksum Clearinghouse is a system of servers
- collecting and counting checksums of millions of mail messages.
--TheSpamAssassin.pm counts can be used by SpamAssassin to detect and
--reject or filter spam.
--
--Because simplistic checksums of spam can be easily defeated, the main
--DCC checksums are fuzzy and ignore aspects of messages.  The fuzzy
--checksums are changed as spam evolves.
-+The counts can be used by SpamAssassin to detect and filter spam.
- 
--Note that DCC is disabled by default in C<init.pre> because it is not
--open source.  See the DCC license for more details.
-+See http://www.dcc-servers.net/dcc/ for more information about DCC.
- 
--See http://www.rhyolite.com/anti-spam/dcc/ for more information about
--DCC.
-+Note that DCC is disabled by default in C<v310.pre> because its use requires
-+software that is not distributed with SpamAssassin and that has license
-+restrictions for certain commercial uses.
-+See the DCC license at http://www.dcc-servers.net/dcc/LICENSE for details.
-+
-+Enable it by uncommenting the "loadplugin Mail::SpamAssassin::Plugin::DCC"
-+confdir/v310.pre or by adding this line to your local.pre.  It might also
-+be necessary to install a DCC package, port, rpm, or equivalent from your
-+operating system distributor or a tarball from the primary DCC source
-+at http://www.dcc-servers.net/dcc/#download
-+See also http://www.dcc-servers.net/dcc/INSTALL.html
- 
- =head1 TAGS
- 
- The following tags are added to the set, available for use in reports,
- header fields, other plugins, etc.:
- 
--  _DCCB_    DCC server ID in a response
--  _DCCR_    response from DCC - header field body in X-DCC-*-Metrics
--  _DCCREP_  response from DCC - DCC reputation in percents (0..100)
--
--Tag _DCCREP_ provides a nonempty value only with commercial DCC systems.
--This is the percentage of spam vs. ham sent from the first untrusted relay.
-+  _DCCB_    DCC server ID in X-DCC-*-Metrics header field name
-+  _DCCR_    X-DCC-*-Metrics header field body
-+  _DCCREP_  DCC Reputation or percent bulk mail (0..100) from
-+	      commercial DCC software
- 
- =cut
- 
-@@ -75,8 +90,6 @@
- use vars qw(@ISA);
- @ISA = qw(Mail::SpamAssassin::Plugin);
- 
--use vars qw($have_inet6);
--
- sub new {
-   my $class = shift;
-   my $mailsaobject = shift;
-@@ -87,7 +100,7 @@
- 
-   # are network tests enabled?
-   if ($mailsaobject->{local_tests_only}) {
--    $self->{dcc_disabled} = 1;
-+    $self->{use_dcc} = 0;
-     dbg("dcc: local tests only, disabling DCC");
-   }
-   else {
-@@ -128,20 +141,23 @@
- 
- =item dcc_fuz2_max NUMBER
- 
--This option sets how often a message's body/fuz1/fuz2 checksum must have been
--reported to the DCC server before SpamAssassin will consider the DCC check as
--matched.
--
--As nearly all DCC clients are auto-reporting these checksums, you should set
--this to a relatively high value, e.g. C<999999> (this is DCC's MANY count).
-+Sets how often a message's body/fuz1/fuz2 checksum must have been reported
-+to the DCC server before SpamAssassin will consider the DCC check hit.
-+C<999999> is DCC's MANY count.
- 
- The default is C<999999> for all these options.
- 
- =item dcc_rep_percent NUMBER
- 
--Only commercial DCC systems provide DCC reputation information. This is the
--percentage of spam vs. ham sent from the first untrusted relay.  It will hit
--on new spam from spam sources.  Default is C<90>.
-+Only the commercial DCC software provides DCC Reputations.  A DCC Reputation
-+is the percentage of bulk mail received from the last untrusted relay in the
-+path taken by a mail message as measured by all commercial DCC installations.
-+See http://www.rhyolite.com/dcc/reputations.html
-+You C<must> whitelist your trusted relays or MX servers with MX or
-+MXDCC lines in /var/dcc/whiteclnt as described in the main DCC man page
-+to avoid seeing your own MX servers as sources of bulk mail.
-+See http://www.dcc-servers.net/dcc/dcc-tree/dcc.html#White-and-Blacklists
-+The default is C<90>.
- 
- =cut
- 
-@@ -189,13 +205,9 @@
- =item dcc_home STRING
- 
- This option tells SpamAssassin where to find the dcc homedir.
--If not given, it will try to get dcc to specify one, and if that fails it
--will try dcc's own default homedir of '/var/dcc'.
--If C<dcc_path> is not specified, it will default to looking in
--C<dcc_home/bin> for dcc client instead of relying on SpamAssassin to find it
--in the current PATH.  If it isn't found there, it will look in the current
--PATH. If a C<dccifd> socket is found in C<dcc_home> or specified explicitly,
--it will use that interface instead of C<dccproc>.
-+If not specified, try to use the locally configured directory
-+from the C<cdcc homedir> command.
-+Try /var/dcc if that command fails.
- 
- =cut
- 
-@@ -205,7 +217,7 @@
-     type => $Mail::SpamAssassin::Conf::CONF_TYPE_STRING,
-     code => sub {
-       my ($self, $key, $value, $line) = @_;
--      if (!defined $value || !length $value) {
-+      if (!defined $value || $value eq '') {
- 	return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE;
-       }
-       $value = untaint_file_path($value);
-@@ -223,14 +235,16 @@
- 
- =item dcc_dccifd_path STRING
- 
--This option tells SpamAssassin where to find the dccifd socket. If
--C<dcc_dccifd_path> is not specified, it will default to looking for a socket
--named C<dccifd> in a directory C<dcc_home>.  The C<dcc_dccifd_path> can be
--a Unix socket name (absolute path), or an INET socket specification in a form
--C<[host]:port> or C<host:port>, where a host can be an IPv4 or IPv6 address
--or a host name, and port is a TCP port number. In case of an IPv6 address the
--brackets are required syntax. If a C<dccifd> socket is found, the plugin will
--use it instead of C<dccproc>.
-+This option tells SpamAssassin where to find the dccifd socket instead
-+of a local Unix socket named C<dccifd> in the C<dcc_home> directory.
-+If a socket is specified or found, use it instead of C<dccproc>.
-+
-+If specifed, C<dcc_dccifd_path> is the absolute path of local Unix socket
-+or an INET socket specified as C<[Host]:Port> or C<Host:Port>.
-+Host can be an IPv4 or IPv6 address or a host name
-+Port is a TCP port number. The brackets are required for an IPv6 address.
-+
-+The default is C<undef>.
- 
- =cut
- 
-@@ -240,45 +254,60 @@
-     type => $Mail::SpamAssassin::Conf::CONF_TYPE_STRING,
-     code => sub {
-       my ($self, $key, $value, $line) = @_;
--      $value = ''  if !defined $value;
--      $self->{dcc_dccifd_path_raw} = $value;  # for logging purposes
--      undef $self->{dcc_dccifd_host};
--      undef $self->{dcc_dccifd_port};
--      undef $self->{dcc_dccifd_socket};
--      local($1,$2,$3);
--      if ($value eq '') {
-+
-+      if (!defined $value || $value eq '') {
- 	return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE;
--      } elsif ($value =~ m{^ (?: \[ ([^\]]*) \] | ([^:]*) ) : ([^:]*) \z}sx) {
--        # "[host]:port" or "host:port", where a host can be an IPv4 or IPv6
--        # address or a host name, and port is a TCP port number or service name
--        my $host = defined $1 ? $1 : $2;
--        my $port = $3;
--        $self->{dcc_dccifd_host} = untaint_var($host);
--        $self->{dcc_dccifd_port} = untaint_var($port);
--        dbg("config: dcc_dccifd_path set to [%s]:%s", $host,$port);
--      } else {  # assume a unix socket
-+      }
-+
-+      local($1,$2,$3);
-+      if ($value =~ m{^ (?: \[ ([^\]]*) \] | ([^:]*) ) : ([^:]*) \z}sx) {
-+	my $host = untaint_var(defined $1 ? $1 : $2);
-+	my $port = untaint_var($3);
-+	if (!$host) {
-+	  info("config: missing or bad host name in dcc_dccifd_path '$value'");
-+	  return $Mail::SpamAssassin::Conf::INVALID_VALUE;
-+	}
-+	if (!$port || $port !~ /^\d+\z/ || $port < 1 || $port > 65535) {
-+	  info("config: bad TCP port number in dcc_dccifd_path '$value'");
-+	  return $Mail::SpamAssassin::Conf::INVALID_VALUE;
-+	}
-+
-+	$self->{dcc_dccifd_host} = $host;
-+	$self->{dcc_dccifd_port} = $port;
-+	if ($host !~ /^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\z/) {
-+	  # remember to try IPv6 if we can with a host name or non-IPv4 address
-+	  $self->{dcc_dccifd_IPv6} = eval { require IO::Socket::INET6 };
-+	}
-+	dbg("config: dcc_dccifd_path set to [%s]:%s", $host, $port);
-+
-+      } else {
-+	# assume a unix socket
-         if ($value !~ m{^/}) {
--          info("config: dcc_dccifd_path should be an absolute socket path");
-+	  info("config: dcc_dccifd_path '$value' is not an absolute path");
-         # return $Mail::SpamAssassin::Conf::INVALID_VALUE;  # abort or accept?
-         }
-         $value = untaint_file_path($value);
--      # test disabled, dccifd may not yet be running at spamd startup time
--      # if (!-S $value) {
--      #   info("config: dcc_dccifd_path '$value' isn't a local socket");
--      #   return $Mail::SpamAssassin::Conf::INVALID_VALUE;
--      # }
-+
-         $self->{dcc_dccifd_socket} = $value;
-         dbg("config: dcc_dccifd_path set to local socket %s", $value);
-+	dbg("dcc: dcc_dccifd_path set to local socket %s", $value);
-       }
-+
-+      $self->{dcc_dccifd_path_raw} = $value;
-     }
-   });
- 
- =item dcc_path STRING
- 
--This option tells SpamAssassin specifically where to find the C<dccproc>
--client instead of relying on SpamAssassin to find it in the current PATH.
--Note that if I<taint mode> is enabled in the Perl interpreter, you should
--use this, as the current PATH will have been cleared.
-+Where to find the C<dccproc> client program instead of relying on SpamAssassin
-+to find it in the current PATH or C<dcc_home/bin>. This must often be set,
-+because the current PATH is cleared by I<taint mode> in the Perl interpreter,
-+
-+If a C<dccifd> socket is found in C<dcc_home> or specified explicitly
-+with C<dcc_dccifd_path>, use the C<dccifd(8)> interface instead of C<dccproc>.
-+
-+The default is C<undef>.
-+
- 
- =cut
- 
-@@ -289,12 +318,12 @@
-     type => $Mail::SpamAssassin::Conf::CONF_TYPE_STRING,
-     code => sub {
-       my ($self, $key, $value, $line) = @_;
--      if (!defined $value || !length $value) {
-+      if (!defined $value || $value eq '') {
- 	return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE;
-       }
-       $value = untaint_file_path($value);
-       if (!-x $value) {
--	info("config: dcc_path '$value' isn't an executable");
-+	info("config: dcc_path '$value' is not executable");
- 	return $Mail::SpamAssassin::Conf::INVALID_VALUE;
-       }
- 
-@@ -304,7 +333,7 @@
- 
- =item dcc_options options
- 
--Specify additional options to the dccproc(8) command. Please note that only
-+Specify additional options to the dccproc(8) command.  Only
- characters in the range [0-9A-Za-z ,._/-] are allowed for security reasons.
- 
- The default is C<undef>.
-@@ -319,6 +348,7 @@
-     code => sub {
-       my ($self, $key, $value, $line) = @_;
-       if ($value !~ m{^([0-9A-Za-z ,._/-]+)$}) {
-+	info("config: dcc_options '$value' contains impermissible characters");
- 	return $Mail::SpamAssassin::Conf::INVALID_VALUE;
-       }
-       $self->{dcc_options} = $1;
-@@ -327,8 +357,9 @@
- 
- =item dccifd_options options
- 
--Specify additional options to send to the dccifd(8) daemon. Please note that only
--characters in the range [0-9A-Za-z ,._/-] are allowed for security reasons.
-+Specify additional options to send to the dccifd daemon with
-+the ASCII protocol described on the dccifd(8) man page.
-+Only characters in the range [0-9A-Za-z ,._/-] are allowed for security reasons.
- 
- The default is C<undef>.
- 
-@@ -342,265 +373,306 @@
-     code => sub {
-       my ($self, $key, $value, $line) = @_;
-       if ($value !~ m{^([0-9A-Za-z ,._/-]+)$}) {
-+	info("config: dccifd_options '$value' contains impermissible characters");
- 	return $Mail::SpamAssassin::Conf::INVALID_VALUE;
-       }
-       $self->{dccifd_options} = $1;
-     }
-   });
- 
-+=item dcc_learn_score n		(default: undef)
-+
-+Report messages with total scores this much larger than the
-+SpamAssassin spam threshold to DCC as spam.
-+
-+=cut
-+
-+  push (@cmds, {
-+    setting => 'dcc_learn_score',
-+    is_admin => 1,
-+    default => undef,
-+    type => $Mail::SpamAssassin::Conf::CONF_TYPE_NUMERIC,
-+  });
-+
-   $conf->{parser}->register_commands(\@cmds);
- }
- 
-+
-+
-+
-+sub ck_dir {
-+  my ($self, $dir, $tgt, $src) = @_;
-+
-+  $dir = untaint_file_path($dir);
-+  if (!stat($dir)) {
-+    my $dir_errno = 0+$!;
-+    if ($dir_errno == ENOENT) {
-+      dbg("dcc: $tgt $dir from $src does not exist");
-+    } else {
-+      dbg("dcc: $tgt $dir from $src is not accessible: $!");
-+    }
-+    return;
-+  }
-+  if (!-d _) {
-+    dbg("dcc: $tgt $dir from $src is not a directory");
-+    return;
-+  }
-+
-+  $self->{main}->{conf}->{$tgt} = $dir;
-+  dbg("dcc: use '$tgt $dir' from $src");
-+}
-+
- sub find_dcc_home {
-   my ($self) = @_;
-+  my $dcc_libexec;
-+
-+  # just once
-+  return if defined $self->{dcc_version};
-+  $self->{dcc_version} = '?';
- 
-   my $conf = $self->{main}->{conf};
--  return if !$conf->{use_dcc};
- 
--  my $dcchome = $conf->{dcc_home} || '';
- 
--  # If we're not given the DCC homedir, try getting DCC to tell us it.
--  # If that fails, try the DCC default homedir of '/var/dcc'.
--  if ($dcchome eq '') {
-+  # Get the DCC software version for talking to dccifd and formating the
-+  # dccifd options and the built-in DCC homedir.  Use -q to prevent delays.
-+  my $cdcc_home;
-+  my $cdcc = $self->dcc_pgm_path('cdcc');
-+  my $cmd = '-qV homedir libexecdir';
-+  if ($cdcc && open(CDCC, "$cdcc $cmd 2>&1 |")) {
-+    my $cdcc_output = do { local $/ = undef; <CDCC> };
-+    close CDCC;
- 
--    my $cdcc = Mail::SpamAssassin::Util::find_executable_in_env_path('cdcc');
-+    $cdcc_output =~ s/\n/ /g;		# everything in 1 line for debugging
-+    dbg("dcc: `%s %s` reports '%s'", $cdcc, $cmd, $cdcc_output);
-+    $self->{dcc_version} = ($cdcc_output =~ /^(\d+\.\d+\.\d+)/) ? $1 : '';
-+    $cdcc_home = ($cdcc_output =~ /\s+homedir=(\S+)/) ? $1 : '';
-+    if ($cdcc_output =~ /\s+libexecdir=(\S+)/) {
-+      $self->ck_dir($1, 'dcc_libexec', 'cdcc');
-+    }
-+  }
- 
--    my $cdcc_home = '';
--    if ($cdcc && -x $cdcc && open(CDCC, "$cdcc homedir 2>&1|")) {
--      dbg("dcc: dcc_home not set, querying cdcc utility");
--      $cdcc_home = <CDCC> || '';
--      close CDCC;
-+  # without a home, try the homedir from cdcc
-+  if (!$conf->{dcc_home} && $cdcc_home) {
-+    $self->ck_dir($cdcc_home, 'dcc_home', 'cdcc');
-+  }
-+  # finally fall back to /var/dcc
-+  if (!$conf->{dcc_home}) {
-+    $self->ck_dir($conf->{dcc_home} = '/var/dcc', 'dcc_home', 'default')
-+  }
- 
--      chomp $cdcc_home;
--      $cdcc_home =~ s/\s+homedir=//;
--      dbg("dcc: cdcc reports homedir as '%s'", $cdcc_home);
--    }
--
--    # try first with whatever the cdcc utility reported
--    my $cdcc_home_errno = 0;
--    if ($cdcc_home eq '') {
--      $cdcc_home_errno = ENOENT;
--    } elsif (!stat($cdcc_home)) {
--      $cdcc_home_errno = 0+$!;
--    }
--    if ($cdcc_home_errno == ENOENT) {
--      # no such file
--    } elsif ($cdcc_home_errno != 0) {
--      dbg("dcc: cdcc reported homedir $cdcc_home is not accessible: $!");
--    } elsif (!-d _) {
--      dbg("dcc: cdcc reported homedir $cdcc_home is not a directory");
--    } else {  # ok
--      dbg("dcc: cdcc reported homedir $cdcc_home exists, using it");
--      $dcchome = untaint_var($cdcc_home);
--    }
--
--    # try falling back to /var/dcc
--    if ($dcchome eq '') {
--      my $var_dcc_errno = stat('/var/dcc') ? 0 : 0+$!;
--      if ($var_dcc_errno == ENOENT) {
--        # no such file
--      } elsif ($var_dcc_errno != 0) {
--        dbg("dcc: dcc_home not set and dcc default homedir /var/dcc ".
--            "is not accessible: $!");
--      } elsif (!-d _) {
--        dbg("dcc: dcc_home not set and dcc default homedir /var/dcc ".
--            "is not a directory");
--      } else {  # ok
--        dbg("dcc: dcc_home not set but dcc default homedir /var/dcc exists, ".
--            "using it");
--        $dcchome = '/var/dcc';
-+  # fall back to $conf->{dcc_home}/libexec or /var/dcc/libexec for dccsight
-+  if (!$conf->{dcc_libexec}) {
-+    $self->ck_dir($conf->{dcc_home} . '/libexec', 'dcc_libexec', 'dcc_home');
-       }
-+  if (!$conf->{dcc_libexec}) {
-+    $self->ck_dir('/var/dcc/libexec', 'dcc_libexec', 'dcc_home');
-     }
- 
--    if ($dcchome eq '') {
--      dbg("dcc: unable to get homedir from cdcc ".
--          "and the dcc default homedir was not found");
--    }
--
--    # Remember found homedir path
--    dbg("dcc: using '%s' as DCC homedir", $dcchome);
--    $conf->{dcc_home} = $dcchome;
-+  # format options for dccifd
-+  my $opts = ($conf->{dccifd_options} || '') . "\n";
-+  if ($self->{dcc_version} =~ /\d+\.(\d+)\.(\d+)$/ &&
-+      ($1 < 3 || ($1 == 3 && $2 < 123))) {
-+    if ($1 < 3 || ($1 == 3 && $2 < 50)) {
-+      info("dcc: DCC version $self->{dcc_version} is years old, ".
-+           "obsolete, and likely to cause problems.  ".
-+           "See http://www.dcc-servers.net/dcc/old-versions.html");
-+    }
-+    $self->{dccifd_lookup_options} = "header " . $opts;
-+    $self->{dccifd_report_options} = "header spam " . $opts;
-+  } else {
-+    # dccifd after version 1.2.123 understands "cksums" and "no-grey"
-+    $self->{dccifd_lookup_options} = "cksums grey-off " . $opts;
-+    $self->{dccifd_report_options} = "header spam grey-off " . $opts;
-   }
- }
- 
--sub is_dccifd_available {
--  my ($self) = @_;
--
-+sub dcc_pgm_path {
-+  my ($self, $pgm) = @_;
-+  my $pgmpath;
-   my $conf = $self->{main}->{conf};
--  $self->{dccifd_available} = 0;
- 
--  if (!$conf->{use_dcc}) {
--    dbg("dcc: dccifd is not available: use_dcc is false");
--  } elsif (defined $conf->{dcc_dccifd_host}) {
--    dbg("dcc: dccifd inet socket chosen: [%s]:%s",
--        $conf->{dcc_dccifd_host}, $conf->{dcc_dccifd_port});
--    $self->{dccifd_available} = 1;
--  } else {
--    my $sockpath = $conf->{dcc_dccifd_socket};
--    my $dcchome = $conf->{dcc_home};
--    if (defined $sockpath) {
--      dbg("dcc: dccifd local socket chosen: %s", $sockpath);
--    } elsif (defined $conf->{dcc_dccifd_path_raw}) {
--      # avoid falling back to defaults if explicitly provided but wrong
--    } elsif (defined $dcchome && $dcchome ne '' && -S "$dcchome/dccifd") {
--      $sockpath = "$dcchome/dccifd";
--      $conf->{dcc_dccifd_socket} = $sockpath;
--      dbg("dcc: dccifd default local socket chosen: %s", $sockpath);
-+  $pgmpath = $conf->{dcc_path};
-+  if (defined $pgmpath && $pgmpath ne '') {
-+    # accept explicit setting for dccproc
-+    return $pgmpath if $pgm eq 'dccproc';
-+    # try adapting it for cdcc and everything else
-+    if ($pgmpath =~ s{[^/]+\z}{$pgm}s) {
-+      $pgmpath = untaint_file_path($pgmpath);
-+      if (-x $pgmpath) {
-+        dbg("dcc: dcc_pgm_path, found %s in dcc_path: %s", $pgm,$pgmpath);
-+        return $pgmpath;
-     }
--    if (defined $sockpath && -S $sockpath && -w _ && -r _) {
--      $self->{dccifd_available} = 1;
--    } elsif (!defined $conf->{dcc_dccifd_path_raw}) {
--      dbg("dcc: dccifd is not available: no r/w dccifd socket found");
--    } else {
--      dbg("dcc: dccifd is not available: no r/w dccifd socket found: %s",
--          $conf->{dcc_dccifd_path_raw});
-     }
-   }
- 
--  return $self->{dccifd_available};
-+  $pgmpath = Mail::SpamAssassin::Util::find_executable_in_env_path($pgm);
-+  if (defined $pgmpath) {
-+    dbg("dcc: dcc_pgm_path, found %s in env.path: %s", $pgm,$pgmpath);
-+    return $pgmpath;
-+  }
-+
-+  # try dcc_home/bin, dcc_libexec, and some desperate last attempts
-+  foreach my $dir ($conf->{dcc_home}.'/bin',  $conf->{dcc_libexec},
-+                   '/usr/local/bin', '/usr/local/dcc', '/var/dcc') {
-+    $pgmpath = $dir . '/' . $pgm;
-+    if (-x $pgmpath) {
-+      dbg("dcc: dcc_pgm_path, found %s in %s: %s", $pgm,$dir,$pgmpath);
-+      return $pgmpath;
-+    }
-+  }
-+
-+  return;
- }
- 
--sub is_dccproc_available {
-+sub is_dccifd_available {
-   my ($self) = @_;
-   my $conf = $self->{main}->{conf};
- 
--  $self->{dccproc_available} = 0;
-+  # dccifd remains available until it breaks
-+  return $self->{dccifd_available} if $self->{dccifd_available};
- 
--  if (!$conf->{use_dcc}) {
--    dbg("dcc: dccproc is not available: use_dcc is false");
--    return 0;
-+  # deal with configured INET socket
-+  if (defined $conf->{dcc_dccifd_host}) {
-+    dbg("dcc: dccifd is available via INET socket [%s]:%s",
-+	$conf->{dcc_dccifd_host}, $conf->{dcc_dccifd_port});
-+    return ($self->{dccifd_available} = 1);
-   }
--  my $dcchome = $conf->{dcc_home} || '';
--  my $dccproc = $conf->{dcc_path} || '';
- 
--  if ($dccproc eq '' && ($dcchome ne '' && -x "$dcchome/bin/dccproc")) {
--    $dccproc = "$dcchome/bin/dccproc";
-+  # the first time here, compute a default local socket based on DCC home
-+  # from self->find_dcc_home() called elsewhere
-+  my $sockpath = $conf->{dcc_dccifd_socket};
-+  if (!$sockpath) {
-+      if ($conf->{dcc_dccifd_path_raw}) {
-+	$sockpath = $conf->{dcc_dccifd_path_raw};
-+      } else {
-+	$sockpath = "$conf->{dcc_home}/dccifd";
-   }
--  if ($dccproc eq '') {
--    $dccproc = Mail::SpamAssassin::Util::find_executable_in_env_path('dccproc');
-+      $conf->{dcc_dccifd_socket} = $sockpath;
-   }
- 
--  unless (defined $dccproc && $dccproc ne '' && -x $dccproc) {
--    dbg("dcc: dccproc is not available: no dccproc executable found");
--    return 0;
--  }
-+  # check the socket every time because it can appear and disappear
-+  return ($self->{dccifd_available} = 1) if (-S $sockpath && -w _ && -r _);
- 
--  # remember any found dccproc
-+  dbg("dcc: dccifd is not available; no r/w socket at %s", $sockpath);
-+  return ($self->{dccifd_available} = 0);
-+}
-+
-+sub is_dccproc_available {
-+  my ($self) = @_;
-+  my $conf = $self->{main}->{conf};
-+
-+  # dccproc remains (un)available so check only once
-+  return $self->{dccproc_available} if  defined $self->{dccproc_available};
-+
-+  my $dccproc = $conf->{dcc_path};
-+  if (!defined $dccproc || $dccproc eq '') {
-+    $dccproc = $self->dcc_pgm_path('dccproc');
-   $conf->{dcc_path} = $dccproc;
-+    if (!$dccproc || ! -x $dccproc) {
-+      dbg("dcc: dccproc is not available: no dccproc executable found");
-+      return ($self->{dccproc_available} = 0);
-+    }
-+  }
- 
--  dbg("dcc: dccproc is available: %s", $conf->{dcc_path});
--  $self->{dccproc_available} = 1;
--  return 1;
-+  dbg("dcc: %s is available", $conf->{dcc_path});
-+  return ($self->{dccproc_available} = 1);
- }
- 
- sub dccifd_connect {
--  my($self) = @_;
-+  my($self, $tag) = @_;
-   my $conf = $self->{main}->{conf};
-   my $sockpath = $conf->{dcc_dccifd_socket};
--  my $host = $conf->{dcc_dccifd_host};
--  my $port = $conf->{dcc_dccifd_port};
-   my $sock;
-+
-   if (defined $sockpath) {
--    dbg("dcc: connecting to a local socket %s", $sockpath);
--    $sock = IO::Socket::UNIX->new(
--              Type => SOCK_STREAM, Peer => $sockpath);
--    $sock or die "dcc: failed to connect to a socket $sockpath: $!\n";
--  } elsif (defined $host) {
--    my $specified_path = $conf->{dcc_dccifd_path_raw};
--    if ($host eq '') {
--      die "dcc: empty host specification: $specified_path\n";
--    }
--    if (!defined $port || $port !~ /^\d+\z/ || $port < 1 || $port > 65535) {
--      die "dcc: bad TCP port number: $specified_path\n";
--    }
--    my $is_inet4 = $host =~ /^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\z/;
--    if ($is_inet4) {  # inet4 socket (IPv4 address)
--      dbg("dcc: connecting to inet4 socket [%s]:%s", $host,$port);
--      $sock = IO::Socket::INET->new(
--                Proto => 'tcp', PeerAddr => $host, PeerPort => $port);
--    } else {
--      if (!defined $have_inet6) {
--        $have_inet6 = eval { require IO::Socket::INET6 };
--        $have_inet6 = 0  if !defined $have_inet6;
-+    $sock = IO::Socket::UNIX->new(Type => SOCK_STREAM, Peer => $sockpath);
-+    if ($sock) {
-+      dbg("$tag connected to local socket %s", $sockpath);
-+      return $sock;
-       }
--      if (!$have_inet6) {  # fallback to an inet4 socket (IPv4)
--        dbg("dcc: connecting(2) to inet4 socket [%s]:%s", $host,$port);
--        $sock = IO::Socket::INET->new(
--                  Proto => 'tcp', PeerAddr => $host, PeerPort => $port);
--      } else {  # inet6 socket (IPv6) or a host name
--        dbg("dcc: connecting to inet6 socket [%s]:%s", $host,$port);
-+    $self->{dccifd_available} = 0;
-+    info("$tag failed to connect to local socket $sockpath");
-+    return $sock
-+  }
-+
-+  # must be TCP/IP
-+  my $host = $conf->{dcc_dccifd_host};
-+  my $port = $conf->{dcc_dccifd_port};
-+
-+  if ($conf->{dcc_dccifd_IPv6}) {
-+    # try IPv6 if we can with a host name or non-IPv4 address
-+    dbg("$tag connecting to inet6 socket [%s]:%s", $host,$port);
-         $sock = IO::Socket::INET6->new(
-                   Proto => 'tcp', PeerAddr => $host, PeerPort => $port);
-+    # fall back to IPv4 if that failed
-       }
-+  if (!$sock) {
-+    dbg("$tag connecting to inet4 socket [%s]:%s", $host, $port);
-+    $sock = IO::Socket::INET->new(
-+		Proto => 'tcp', PeerAddr => $host, PeerPort => $port);
-     }
--    $sock or die "dcc: failed to connect to [$host]:$port : $!\n";
--  } else {
--    die "dcc: dccifd socket not provided: $conf->{dcc_dccifd_path_raw}\n";
--  }
-+
-+  info("failed to connect to [$host]:$port : $!") if !$sock;
-   return $sock;
- }
- 
-+# check for dccifd every time in case enough uses of dccproc starts dccifd
- sub get_dcc_interface {
-   my ($self) = @_;
-+  my $conf = $self->{main}->{conf};
- 
--  if ($self->is_dccifd_available()) {
--    $self->{dcc_interface} = "dccifd";
--    $self->{dcc_disabled} = 0;
--  }
--  elsif ($self->is_dccproc_available()) {
--    $self->{dcc_interface} = "dccproc";
--    $self->{dcc_disabled} = 0;
-+  if (!$conf->{use_dcc}) {
-+    $self->{dcc_disabled} = 1;
-+    return;
-   }
--  else {
--    dbg("dcc: dccifd and dccproc are not available, disabling DCC");
--    $self->{dcc_interface} = "none";
-+
-+  $self->find_dcc_home();
-+  if (!$self->is_dccifd_available() && !$self->is_dccproc_available()) {
-+    dbg("dcc: dccifd and dccproc are not available");
-     $self->{dcc_disabled} = 1;
-   }
-+
-+  $self->{dcc_disabled} = 0;
- }
- 
- sub dcc_query {
--  my ($self, $permsgstatus, $full) = @_;
-+  my ($self, $permsgstatus, $fulltext) = @_;
- 
-   $permsgstatus->{dcc_checked} = 1;
- 
-+  if (!$self->{main}->{conf}->{use_dcc}) {
-+    dbg("dcc: DCC is not available: use_dcc is 0");
-+    return;
-+  }
-+
-   # initialize valid tags
-   $permsgstatus->{tag_data}->{DCCB} = "";
-   $permsgstatus->{tag_data}->{DCCR} = "";
-   $permsgstatus->{tag_data}->{DCCREP} = "";
- 
--  # short-circuit if there's already a X-DCC header with value of
--  # "bulk" from an upstream DCC check
--  if ($permsgstatus->get('ALL') =~
--      /^(X-DCC-([^:]{1,80})?-?Metrics:.*bulk.*)$/m) {
--    $permsgstatus->{dcc_response} = $1;
-+  if ($$fulltext eq '') {
-+    dbg("dcc: empty message; skipping dcc check");
-     return;
-   }
- 
--  my $timer = $self->{main}->time_method("check_dcc");
-+  if ($permsgstatus->get('ALL') =~ /^(X-DCC-.*-Metrics:.*)$/m) {
-+    $permsgstatus->{dcc_raw_x_dcc} = $1;
-+    # short-circuit if there is already a X-DCC header with value of
-+    # "bulk" from an upstream DCC check
-+    # require "bulk" because then at least one body checksum will be "many"
-+    # and so we know the X-DCC header is not forged by spammers
-+    return if $permsgstatus->{dcc_raw_x_dcc} =~ / bulk /;
-+  }
- 
--  $self->find_dcc_home();
-+  my $timer = $self->{main}->time_method("check_dcc");
- 
-   $self->get_dcc_interface();
--  my $result;
--  if ($self->{dcc_disabled}) {
--    $result = 0;
--  } elsif ($$full eq '') {
--    dbg("dcc: empty message, skipping dcc check");
--    $result = 0;
--  } elsif ($self->{dccifd_available}) {
--    my $client = $permsgstatus->{relays_external}->[0]->{ip};
--    my $clientname = $permsgstatus->{relays_external}->[0]->{rdns};
--    my $helo = $permsgstatus->{relays_external}->[0]->{helo} || "";
--    if ($client) {
--      $client = $client . "\r" . $clientname  if $clientname;
--    } else {
--      $client = "0.0.0.0";
--    }
--    $self->dccifd_lookup($permsgstatus, $full, $client, $clientname, $helo);
--  } else {
--    my $client = $permsgstatus->{relays_external}->[0]->{ip};
--    $self->dccproc_lookup($permsgstatus, $full, $client);
--  }
-+  return if $self->{dcc_disabled};
-+
-+  my $envelope = $permsgstatus->{relays_external}->[0];
-+  ($permsgstatus->{dcc_raw_x_dcc},
-+   $permsgstatus->{dcc_cksums}) = $self->ask_dcc("dcc:", $permsgstatus,
-+						 $fulltext, $envelope);
- }
- 
- sub check_dcc {
-@@ -609,28 +681,27 @@
- 
-   $self->dcc_query($permsgstatus, $full)  if !$permsgstatus->{dcc_checked};
- 
--  my $response = $permsgstatus->{dcc_response};
--  return 0  if !defined $response || $response eq '';
-+  my $x_dcc = $permsgstatus->{dcc_raw_x_dcc};
-+  return 0  if !defined $x_dcc || $x_dcc eq '';
- 
--  local($1,$2);
--  if ($response =~ /^X-DCC-(.*)-Metrics: (.*)$/) {
--    $permsgstatus->{tag_data}->{DCCB} = $1;
--    $permsgstatus->{tag_data}->{DCCR} = $2;
-+  if ($x_dcc =~ /^X-DCC-(.*)-Metrics: (.*)$/) {
-+    $permsgstatus->set_tag('DCCB', $1);
-+    $permsgstatus->set_tag('DCCR', $2);
-   }
--  $response =~ s/many/999999/ig;
--  $response =~ s/ok\d?/0/ig;
-+  $x_dcc =~ s/many/999999/ig;
-+  $x_dcc =~ s/ok\d?/0/ig;
- 
-   my %count = (body => 0, fuz1 => 0, fuz2 => 0, rep => 0);
--  if ($response =~ /\bBody=(\d+)/) {
-+  if ($x_dcc =~ /\bBody=(\d+)/) {
-     $count{body} = $1+0;
-   }
--  if ($response =~ /\bFuz1=(\d+)/) {
-+  if ($x_dcc =~ /\bFuz1=(\d+)/) {
-     $count{fuz1} = $1+0;
-   }
--  if ($response =~ /\bFuz2=(\d+)/) {
-+  if ($x_dcc =~ /\bFuz2=(\d+)/) {
-     $count{fuz2} = $1+0;
-   }
--  if ($response =~ /\brep=(\d+)/) {
-+  if ($x_dcc =~ /\brep=(\d+)/) {
-     $count{rep}  = $1+0;
-   }
-   if ($count{body} >= $conf->{dcc_body_max} ||
-@@ -651,185 +722,185 @@
- }
- 
- sub check_dcc_reputation_range {
--  my ($self, $permsgstatus, $full, $min, $max) = @_;
--  $self->dcc_query($permsgstatus, $full)  if !$permsgstatus->{dcc_checked};
-+  my ($self, $permsgstatus, $fulltext, $min, $max) = @_;
-+
-+  # this is called several times per message, so parse the X-DCC header once
-+  my $dcc_rep = $permsgstatus->{dcc_rep};
-+  if (!defined $dcc_rep) {
-+    $self->dcc_query($permsgstatus, $fulltext)  if !$permsgstatus->{dcc_checked};
-+    my $x_dcc = $permsgstatus->{dcc_raw_x_dcc};
-+    if (defined $x_dcc && $x_dcc =~ /\brep=(\d+)/) {
-+      $dcc_rep = $1+0;
-+      $permsgstatus->set_tag('DCCREP', $dcc_rep);
-+    } else {
-+      $dcc_rep = -1;
-+    }
-+    $permsgstatus->{dcc_rep} = $dcc_rep;
-+  }
- 
--  my $response = $permsgstatus->{dcc_response};
--  return 0  if !defined $response || $response eq '';
-+  # no X-DCC header or no reputation in the X-DCC header, perhaps for lack
-+  # of data in the DCC Reputation server
-+  return 0 if $dcc_rep < 0;
- 
-+  # cover the entire range of reputations if not told otherwise
-   $min = 0   if !defined $min;
--  $max = 999 if !defined $max;
-+  $max = 100 if !defined $max;
- 
--  local $1;
--  my $dcc_rep;
--  $dcc_rep = $1+0  if defined $response && $response =~ /\brep=(\d+)/;
--  if (defined $dcc_rep) {
--    $dcc_rep = int($dcc_rep);  # just in case, rule ranges are integer percents
-     my $result = $dcc_rep >= $min && $dcc_rep <= $max ? 1 : 0;
-     dbg("dcc: dcc_rep %s, min %s, max %s => result=%s",
-         $dcc_rep, $min, $max, $result?'YES':'no');
--    $permsgstatus->{tag_data}->{DCCREP} = $dcc_rep;
--    return $dcc_rep >= $min && $dcc_rep <= $max ? 1 : 0;
-+  return $result;
-+}
-+
-+# get the X-DCC header line and save the checksums from dccifd or dccproc
-+sub parse_dcc_response {
-+  my ($self, $resp) = @_;
-+  my ($raw_x_dcc, $cksums);
-+
-+  # The first line is the header we want.  It uses SMTP folded whitespace
-+  # if it is long.  The folded whitespace is always a single \t.
-+  chomp($raw_x_dcc = shift @$resp);
-+  my $v;
-+  while (($v = shift @$resp) && $v =~ s/^\t(.+)\s*\n/ $1/) {
-+    $raw_x_dcc .= $v;
-+  }
-+
-+  # skip the "reported:" line between the X-DCC header and any checksums
-+  # remove ':' to avoid a bug in versions 1.3.115 - 1.3.122 in dccsight
-+  # with the length of "Message-ID:"
-+  $cksums = '';
-+  while (($v = shift @$resp) && $v =~ s/^([^:]*):/$1/) {
-+    $cksums .= $v;
-   }
--  return 0;
-+
-+  return ($raw_x_dcc, $cksums);
- }
- 
--sub dccifd_lookup {
--  my ($self, $permsgstatus, $fulltext, $client, $clientname, $helo) = @_;
-+sub ask_dcc {
-+  my ($self, $tag, $permsgstatus, $fulltext, $envelope) = @_;
-   my $conf = $self->{main}->{conf};
--  my $response;
--  my $left;
--  my $right;
--  my $timeout = $conf->{dcc_timeout};
--  my $opts = $conf->{dccifd_options};
--  my @opts = !defined $opts ? () : split(' ',$opts);
-+  my ($pgm, $err, $sock, $pid, @resp);
-+  my ($client, $clientname, $helo, $opts);
- 
-   $permsgstatus->enter_helper_run_mode();
- 
-+  my $timeout = $conf->{dcc_timeout};
-   my $timer = Mail::SpamAssassin::Timeout->new(
-            { secs => $timeout, deadline => $permsgstatus->{master_deadline} });
--  my $err = $timer->run_and_catch(sub {
- 
-+  $err = $timer->run_and_catch(sub {
-     local $SIG{PIPE} = sub { die "__brokenpipe__ignore__\n" };
- 
--    my $sock = $self->dccifd_connect();
--    $sock or die "dcc: failed to connect to a dccifd socket";
--
--    # send the options and other parameters to the daemon
--    $sock->print("header " . join(" ", at opts) . "\n")
--                                 or die "dcc: failed write";  # options
--    $sock->print($client . "\n") or die "dcc: failed write";  # client
--    $sock->print($helo . "\n")   or die "dcc: failed write";  # HELO value
--    $sock->print("\n")           or die "dcc: failed write";  # sender
--    $sock->print("unknown\r\n")  or die "dcc: failed write";  # recipients
--    $sock->print("\n")           or die "dcc: failed write";  # recipients
--
--    $sock->print($$fulltext)     or die "dcc: failed write";
--
--    $sock->shutdown(1) or die "dcc: failed socket shutdown: $!";
--
--    $sock->getline()   or die "dcc: failed read status";
--    $sock->getline()   or die "dcc: failed read multistatus";
-+    # prefer dccifd to dccproc
-+    if ($self->{dccifd_available}) {
-+      $pgm = 'dccifd';
- 
--    my @null = $sock->getlines();
--    if (!@null) {
--      # no facility prefix on this
--      die "dcc: failed to read header\n";
--    }
-+      $sock = $self->dccifd_connect($tag);
-+      if (!$sock) {
-+	$self->{dccifd_available} = 0;
-+	die("dccproc not available") if (!$self->is_dccproc_available());
- 
--    # the first line will be the header we want to look at
--    chomp($response = shift @null);
--    # but newer versions of DCC fold the header if it's too long...
--    while (my $v = shift @null) {
--      last unless ($v =~ s/^\s+/ /);  # if this line wasn't folded, stop
--      chomp $v;
--      $response .= $v;
-+	# fall back on dccproc if the socket is an orphan from
-+	# a killed dccifd daemon or some other obvious (no timeout) problem
-+	dbg("$tag fall back on dccproc");
-     }
--
--    dbg("dcc: dccifd got response: %s", $response);
--  
--  });
--
--  $permsgstatus->leave_helper_run_mode();
--
--  if ($timer->timed_out()) {
--    dbg("dcc: dccifd check timed out after $timeout secs.");
--    return;
-   }
- 
--  if ($err) {
--    chomp $err;
--    warn("dcc: dccifd -> check skipped: $err\n");
--    return;
--  }
-+    if ($self->{dccifd_available}) {
- 
--  if (!defined $response || $response !~ /^X-DCC/) {
--    dbg("dcc: dccifd check failed - no X-DCC returned: %s", $response);
--    return;
-+      # send the options and other parameters to the daemon
-+      $client = $envelope->{ip};
-+      $clientname = $envelope->{rdns};
-+      if (!defined $client) {
-+	$client = '';
-+      } else {
-+	$client .= ("\r" . $clientname) if defined $clientname;
-   }
-+      $helo = $envelope->{helo} || '';
-+      if ($tag ne "dcc:") {
-+	$opts = $self->{dccifd_report_options}
-+      } else {
-+	$opts = $self->{dccifd_lookup_options};
-+	# only query if there is an X-DCC header
-+	$opts =~ s/grey-off/& query/ if defined $permsgstatus->{dcc_raw_x_dcc};
-+      }
-+      $sock->print($opts)	   or die "failed write options\n";
-+      $sock->print($client . "\n") or die "failed write SMTP client\n";
-+      $sock->print($helo . "\n")   or die "failed write HELO value\n";
-+      $sock->print("\n")	   or die "failed write sender\n";
-+      $sock->print("unknown\n\n")  or die "failed write 1 recipient\n";
-+      $sock->print($$fulltext)     or die "failed write mail message\n";
-+      $sock->shutdown(1) or die "failed socket shutdown: $!";
- 
--  $response =~ s/[ \t]\z//;  # strip trailing whitespace
--  $permsgstatus->{dcc_response} = $response;
--}
-+      $sock->getline()   or die "failed read status\n";
-+      $sock->getline()   or die "failed read multistatus\n";
- 
--sub dccproc_lookup {
--  my ($self, $permsgstatus, $fulltext, $client) = @_;
--  my $conf = $self->{main}->{conf};
--  my $response;
--  my %count = (body => 0, fuz1 => 0, fuz2 => 0, rep => 0);
--  my $timeout = $conf->{dcc_timeout};
-+      @resp = $sock->getlines();
-+      die "failed to read dccifd response\n" if !@resp;
- 
--  $permsgstatus->enter_helper_run_mode();
--
--  # use a temp file here -- open2() is unreliable, buffering-wise, under spamd
-+    } else {
-+      $pgm = 'dccproc';
-+      # use a temp file -- open2() is unreliable, buffering-wise, under spamd
-+      # first ensure that we do not hit a stray file from some other filter.
-+      $permsgstatus->delete_fulltext_tmpfile();
-   my $tmpf = $permsgstatus->create_fulltext_tmpfile($fulltext);
--  my $pid;
--
--  my $timer = Mail::SpamAssassin::Timeout->new(
--           { secs => $timeout, deadline => $permsgstatus->{master_deadline} });
--  my $err = $timer->run_and_catch(sub {
--
--    local $SIG{PIPE} = sub { die "__brokenpipe__ignore__\n" };
- 
--    # note: not really tainted, this came from system configuration file
--    my $path = untaint_file_path($conf->{dcc_path});
--
--    my $opts = $conf->{dcc_options};
-+      my $path = $conf->{dcc_path};
-+      $opts = $conf->{dcc_options};
-     my @opts = !defined $opts ? () : split(' ',$opts);
-     untaint_var(\@opts);
-+      unshift(@opts, '-w', 'whiteclnt');
-+      $client = $envelope->{ip};
-+      if ($client) {
-+	unshift(@opts, '-a', untaint_var($client));
-+      } else {
-+	# get external relay IP address from Received: header if not available
-+	unshift(@opts, '-R');
-+      }
-+      if ($tag eq "dcc:") {
-+	# query instead of report if there is an X-DCC header from upstream
-+	unshift(@opts, '-Q') if defined $permsgstatus->{dcc_raw_x_dcc};
-+      } else {
-+	# learn or report spam
-+	unshift(@opts, '-t', 'many');
-+      }
- 
--    unshift(@opts, "-a",
--            untaint_var($client))  if defined $client && $client ne '';
--
--    dbg("dcc: opening pipe: %s",
--         join(' ', $path, "-H", "-x", "0", @opts, "< $tmpf"));
-+      dbg("$tag opening pipe to %s",
-+	  join(' ', $path, "-C", "-x", "0", @opts, "<$tmpf"));
- 
-     $pid = Mail::SpamAssassin::Util::helper_app_pipe_open(*DCC,
--             $tmpf, 1, $path, "-H", "-x", "0", @opts);
-+		$tmpf, 1, $path, "-C", "-x", "0", @opts);
-     $pid or die "$!\n";
- 
-     # read+split avoids a Perl I/O bug (Bug 5985)
-     my($inbuf,$nread,$resp); $resp = '';
-     while ( $nread=read(DCC,$inbuf,8192) ) { $resp .= $inbuf }
-     defined $nread  or die "error reading from pipe: $!";
--    my @null = split(/^/m, $resp, -1);  undef $resp;
-+      @resp = split(/^/m, $resp, -1);  undef $resp;
- 
-     my $errno = 0;  close DCC or $errno = $!;
-     proc_status_ok($?,$errno)
--      or info("dcc: [%s] finished: %s", $pid, exit_status_str($?,$errno));
--
--    if (!@null) {
--      # no facility prefix on this
--      die "failed to read header\n";
--    }
-+	  or info("$tag [%s] finished: %s", $pid, exit_status_str($?,$errno));
- 
--    # the first line will be the header we want to look at
--    chomp($response = shift @null);
--    # but newer versions of DCC fold the header if it's too long...
--    while (my $v = shift @null) {
--      last unless ($v =~ s/^\s+/ /);  # if this line wasn't folded, stop
--      chomp $v;
--      $response .= $v;
-+      die "failed to read X-DCC header from dccproc\n" if !@resp;
-     }
--
--    unless (defined($response)) {
--      # no facility prefix on this
--      die "no response\n";	# yes, this is possible
--    }
--
--    dbg("dcc: got response: %s", $response);
--
-   });
- 
-+  if ($pgm eq 'dccproc') {
-   if (defined(fileno(*DCC))) {  # still open
-     if ($pid) {
--      if (kill('TERM',$pid)) { dbg("dcc: killed stale helper [$pid]") }
--      else { dbg("dcc: killing helper application [$pid] failed: $!") }
-+	if (kill('TERM',$pid)) {
-+	  dbg("$tag killed stale dccproc process [$pid]")
-+	} else {
-+	  dbg("$tag killing dccproc process [$pid] failed: $!")
-+	}
-     }
-     my $errno = 0;  close(DCC) or $errno = $!;
--    proc_status_ok($?,$errno)
--      or info("dcc: [%s] terminated: %s", $pid, exit_status_str($?,$errno));
-+      proc_status_ok($?,$errno) or info("$tag [%s] dccproc terminated: %s",
-+					$pid, exit_status_str($?,$errno));
-+    }
-   }
-+
-   $permsgstatus->leave_helper_run_mode();
- 
-   if ($timer->timed_out()) {
-@@ -833,204 +904,182 @@
-   $permsgstatus->leave_helper_run_mode();
- 
-   if ($timer->timed_out()) {
--    dbg("dcc: check timed out after $timeout seconds");
--    return;
-+    dbg("$tag $pgm timed out after $timeout seconds");
-+    return (undef, undef);
-   }
- 
-   if ($err) {
-     chomp $err;
--    if ($err eq "__brokenpipe__ignore__") {
--      dbg("dcc: check failed: broken pipe");
--    } elsif ($err eq "no response") {
--      dbg("dcc: check failed: no response");
--    } else {
--      warn("dcc: check failed: $err\n");
--    }
--    return;
-+    info("$tag $pgm failed: $err\n");
-+    return (undef, undef);
-   }
- 
--  if (!defined($response) || $response !~ /^X-DCC/) {
--    $response ||= '';
--    dbg("dcc: check failed: no X-DCC returned (did you create a map file?): %s", $response);
--    return;
-+  my ($raw_x_dcc, $cksums) = $self->parse_dcc_response(\@resp);
-+  if (!defined $raw_x_dcc || $raw_x_dcc !~ /^X-DCC/) {
-+    info("$tag instead of X-DCC header, $pgm returned '%s'", $raw_x_dcc);
-+    return (undef, undef);
-   }
--
--  $permsgstatus->{dcc_response} = $response;
-+  dbg("$tag %s responded with '%s'", $pgm, $raw_x_dcc);
-+  return ($raw_x_dcc, $cksums);
- }
- 
--# only supports dccproc right now
--sub plugin_report {
-+# tell DCC server that the message is spam according to SpamAssassin
-+sub check_post_learn {
-   my ($self, $options) = @_;
- 
--  return if $options->{report}->{options}->{dont_report_to_dcc};
--  $self->get_dcc_interface();
--  return if $self->{dcc_disabled};
--
--  # get the metadata from the message so we can pass the external relay information
--  $options->{msg}->extract_message_metadata($options->{report}->{main});
--  my $client = $options->{msg}->{metadata}->{relays_external}->[0]->{ip};
--  if ($self->{dccifd_available}) {
--    my $clientname = $options->{msg}->{metadata}->{relays_external}->[0]->{rdns};
--    my $helo = $options->{msg}->{metadata}->{relays_external}->[0]->{helo} || "";
--    if ($client) {
--      if ($clientname) {
--        $client = $client . "\r" . $clientname;
--      }
--    } else {
--      $client = "0.0.0.0";
--    }
--    if ($self->dccifd_report($options, $options->{text}, $client, $helo)) {
--      $options->{report}->{report_available} = 1;
--      info("reporter: spam reported to DCC");
--      $options->{report}->{report_return} = 1;
-+  # learn only if allowed
-+  return if $self->{learn_disabled};
-+  my $conf = $self->{main}->{conf};
-+  if (!$conf->{use_dcc}) {
-+    $self->{learn_disabled} = 1;
-+    return;
-     }
--    else {
--      info("reporter: could not report spam to DCC via dccifd");
-+  my $learn_score = $conf->{dcc_learn_score};
-+  if (!defined $learn_score || $learn_score eq '') {
-+    dbg("dcc: DCC learning not enabled by dcc_learn_score");
-+    $self->{learn_disabled} = 1;
-+    return;
-     }
--  } else {
--    # use temporary file: open2() is unreliable due to buffering under spamd
--    my $tmpf = $options->{report}->create_fulltext_tmpfile($options->{text});
-     
--    if ($self->dcc_report($options, $tmpf, $client)) {
--      $options->{report}->{report_available} = 1;
--      info("reporter: spam reported to DCC");
--      $options->{report}->{report_return} = 1;
-+  # and if SpamAssassin concluded that the message is spam
-+  # worse than our threshold
-+  my $permsgstatus = $options->{permsgstatus};
-+  if ($permsgstatus->is_spam()) {
-+    my $score = $permsgstatus->get_score();
-+    my $required_score = $permsgstatus->get_required_score();
-+    if ($score < $required_score + $learn_score) {
-+      dbg("dcc: score=%d required_score=%d dcc_learn_score=%d",
-+	  $score, $required_score, $learn_score);
-+      return;
-     }
--    else {
--      info("reporter: could not report spam to DCC via dccproc");
-     }
--    $options->{report}->delete_fulltext_tmpfile();
-+
-+  # and if we checked the message
-+  return if (!defined $permsgstatus->{dcc_raw_x_dcc});
-+
-+  # and if the DCC server thinks it was not spam
-+  if ($permsgstatus->{dcc_raw_x_dcc} !~ /\b(Body|Fuz1|Fuz2)=\d/) {
-+    dbg("dcc: already known as spam; no need to learn");
-+    return;
-   }
-+
-+  # dccsight is faster than dccifd or dccproc if we have checksums,
-+  #   which we do not have with dccifd before 1.3.123
-+  my $old_cksums = $permsgstatus->{dcc_cksums};
-+  return if ($old_cksums && $self->dccsight_learn($permsgstatus, $old_cksums));
-+
-+  # Fall back on dccifd or dccproc without saved checksums or dccsight.
-+  # get_dcc_interface() was called when the message was checked
-+
-+  # is getting the full text this way kosher?  Is get_pristine() public?
-+  my $fulltext = $permsgstatus->{msg}->get_pristine();
-+  my $envelope = $permsgstatus->{relays_external}->[0];
-+  my ($raw_x_dcc, $cksums) = $self->ask_dcc("dcc: learn:", $permsgstatus,
-+					    \$fulltext, $envelope);
-+  dbg("dcc: learned as spam") if defined $raw_x_dcc;
- }
- 
--sub dccifd_report {
--  my ($self, $options, $fulltext, $client, $helo) = @_;
--  my $conf = $self->{main}->{conf};
--  my $timeout = $conf->{dcc_timeout};
--  # instead of header use whatever the report option is
--  my $opts = $conf->{dccifd_options};
--  my @opts = !defined $opts ? () : split(' ',$opts);
-+sub dccsight_learn {
-+  my ($self, $permsgstatus, $old_cksums) = @_;
-+  my ($raw_x_dcc, $new_cksums);
-+
-+  return 0 if !$old_cksums;
-+
-+  my $dccsight = $self->dcc_pgm_path('dccsight');
-+  if (!$dccsight) {
-+    info("dcc: cannot find dccsight") if $dccsight eq '';
-+    return 0;
-+  }
- 
--  $options->{report}->enter_helper_run_mode();
--  my $timer = Mail::SpamAssassin::Timeout->new({ secs => $timeout });
-+  $permsgstatus->enter_helper_run_mode();
- 
--  my $err = $timer->run_and_catch(sub {
-+  # use a temp file here -- open2() is unreliable, buffering-wise, under spamd
-+  # ensure that we do not hit a stray file from some other filter.
-+  $permsgstatus->delete_fulltext_tmpfile();
-+  my $tmpf = $permsgstatus->create_fulltext_tmpfile(\$old_cksums);
-+  my $pid;
- 
-+  my $timeout = $self->{main}->{conf}->{dcc_timeout};
-+  my $timer = Mail::SpamAssassin::Timeout->new(
-+	   { secs => $timeout, deadline => $permsgstatus->{master_deadline} });
-+  my $err = $timer->run_and_catch(sub {
-     local $SIG{PIPE} = sub { die "__brokenpipe__ignore__\n" };
- 
--    my $sock = $self->dccifd_connect();
--    $sock or die "report: failed to connect to a dccifd socket";
-+    dbg("dcc: opening pipe to %s",
-+	join(' ', $dccsight, "-t", "many", "<$tmpf"));
- 
--    # send the options and other parameters to the daemon
--    $sock->print("spam " . join(" ", at opts) . "\n")
--      or die "report: dccifd failed write"; # options
--    $sock->print($client . "\n")
--      or die "report: dccifd failed write"; # client
--    $sock->print($helo . "\n")
--      or die "report: dccifd failed write"; # HELO value
--    $sock->print("\n")
--      or die "report: dccifd failed write"; # sender
--    $sock->print("unknown\r\n")
--      or die "report: dccifd failed write"; # recipients
--    $sock->print("\n")
--      or die "report: dccifd failed write"; # recipients
-+    $pid = Mail::SpamAssassin::Util::helper_app_pipe_open(*DCC,
-+	    $tmpf, 1, $dccsight, "-t", "many");
-+    $pid or die "$!\n";
- 
--    $sock->print($$fulltext) or die "report: dccifd failed write";
-+    # read+split avoids a Perl I/O bug (Bug 5985)
-+    my($inbuf,$nread,$resp); $resp = '';
-+    while ( $nread=read(DCC,$inbuf,8192) ) { $resp .= $inbuf }
-+    defined $nread  or die "error reading from pipe: $!";
-+    my @resp = split(/^/m, $resp, -1);  undef $resp;
- 
--    $sock->shutdown(1) or die "report: dccifd failed socket shutdown: $!";
-+    my $errno = 0;  close DCC or $errno = $!;
-+    proc_status_ok($?,$errno)
-+	  or info("dcc: [%s] finished: %s", $pid, exit_status_str($?,$errno));
- 
--    $sock->getline() or die "report: dccifd failed read status";
--    $sock->getline() or die "report: dccifd failed read multistatus";
-+    die "dcc: failed to read learning response\n" if !@resp;
- 
--    my @ignored = $sock->getlines();
-+    ($raw_x_dcc, $new_cksums) = $self->parse_dcc_response(\@resp);
-   });
- 
--  $options->{report}->leave_helper_run_mode();
-+  if (defined(fileno(*DCC))) {	  # still open
-+    if ($pid) {
-+      if (kill('TERM',$pid)) {
-+	dbg("dcc: killed stale dccsight process [$pid]")
-+      } else {
-+	dbg("dcc: killing stale dccsight process [$pid] failed: $!") }
-+    }
-+    my $errno = 0;  close(DCC) or $errno = $!;
-+    proc_status_ok($?,$errno) or info("dcc: dccsight [%s] terminated: %s",
-+				      $pid, exit_status_str($?,$errno));
-+  }
-+  $permsgstatus->delete_fulltext_tmpfile();
-+  $permsgstatus->leave_helper_run_mode();
-   
-   if ($timer->timed_out()) {
--    dbg("reporter: DCC report via dccifd timed out after $timeout secs.");
-+    dbg("dcc: dccsight timed out after $timeout seconds");
-     return 0;
-   }
-   
-   if ($err) {
-     chomp $err;
--    if ($err eq "__brokenpipe__ignore__") {
--      dbg("reporter: DCC report via dccifd failed: broken pipe");
--    } else {
--      warn("reporter: DCC report via dccifd failed: $err\n");
--    }
-+    info("dcc: dccsight failed: $err\n");
-     return 0;
-   }
-   
-+  if ($raw_x_dcc) {
-+    dbg("dcc: learned response: %s", $raw_x_dcc);
-   return 1;
--}
--  
--sub dcc_report {
--  my ($self, $options, $tmpf, $client) = @_;
--  my $conf = $self->{main}->{conf};
--  my $timeout = $options->{report}->{conf}->{dcc_timeout};
--
--  # note: not really tainted, this came from system configuration file
--  my $path = untaint_file_path($options->{report}->{conf}->{dcc_path});
--  my $opts = $conf->{dcc_options};
--  my @opts = !defined $opts ? () : split(' ',$opts);
--  untaint_var(\@opts);
--
--  # get the metadata from the message so we can pass the external relay info
--
--  unshift(@opts, "-a",
--          untaint_var($client))  if defined $client && $client ne '';
--
--  my $timer = Mail::SpamAssassin::Timeout->new({ secs => $timeout });
--
--  $options->{report}->enter_helper_run_mode();
--  my $err = $timer->run_and_catch(sub {
--
--    local $SIG{PIPE} = sub { die "__brokenpipe__ignore__\n" };
--
--    dbg("report: opening pipe: %s",
--        join(' ', $path, "-H", "-t", "many", "-x", "0", @opts, "< $tmpf"));
--
--    my $pid = Mail::SpamAssassin::Util::helper_app_pipe_open(*DCC,
--                $tmpf, 1, $path, "-H", "-t", "many", "-x", "0", @opts);
--    $pid or die "$!\n";
-+  }
- 
--    my($inbuf,$nread,$nread_all); $nread_all = 0;
--    # response is ignored, just check its existence
--    while ( $nread=read(DCC,$inbuf,8192) ) { $nread_all += $nread }
--    defined $nread  or die "error reading from pipe: $!";
-+  return 0;
-+}
- 
--    dbg("dcc: empty response")  if $nread_all < 1;
-+sub plugin_report {
-+  my ($self, $options) = @_;
- 
--    my $errno = 0;  close DCC or $errno = $!;
--    # closing a pipe also waits for the process executing on the pipe to
--    # complete, no need to explicitly call waitpid
--    # my $child_stat = waitpid($pid,0) > 0 ? $? : undef;
--    proc_status_ok($?,$errno)
--      or die "dcc: reporter error: ".exit_status_str($?,$errno)."\n";
--  });
--  $options->{report}->leave_helper_run_mode();
-+  return if $options->{report}->{options}->{dont_report_to_dcc};
-+  $self->get_dcc_interface();
-+  return if $self->{dcc_disabled};
- 
--  if ($timer->timed_out()) {
--    dbg("reporter: DCC report via dccproc timed out after $timeout seconds");
--    return 0;
--  }
-+  # get the metadata from the message so we can report the external relay
-+  $options->{msg}->extract_message_metadata($options->{report}->{main});
-+  my $envelope = $options->{msg}->{metadata}->{relays_external}->[0];
-+  my ($raw_x_dcc, $cksums) = $self->ask_dcc("reporter:", $options->{report},
-+					    $options->{text}, $envelope);
- 
--  if ($err) {
--    chomp $err;
--    if ($err eq "__brokenpipe__ignore__") {
--      dbg("reporter: DCC report via dccproc failed: broken pipe");
-+  if (defined $raw_x_dcc) {
-+    $options->{report}->{report_available} = 1;
-+    info("reporter: spam reported to DCC");
-+    $options->{report}->{report_return} = 1;
-     } else {
--      warn("reporter: DCC report via dccproc failed: $err\n");
-+    info("reporter: could not report spam to DCC");
-     }
--    return 0;
--  }
--
--  return 1;
- }
- 
- 1;
--
--=back
--
--=cut

Added: trunk/mail/spamassassin/files/patch-bug7018
===================================================================
--- trunk/mail/spamassassin/files/patch-bug7018	                        (rev 0)
+++ trunk/mail/spamassassin/files/patch-bug7018	2014-09-12 01:45:46 UTC (rev 16990)
@@ -0,0 +1,11 @@
+--- lib/Mail/SpamAssassin/Plugin/Razor2.pm.orig	2014/02/27 00:44:06	1572368
++++ lib/Mail/SpamAssassin/Plugin/Razor2.pm	2014/02/27 00:50:42	1572369
+@@ -115,7 +115,7 @@
+     setting => 'razor_timeout',
+     is_admin => 1,
+     default => 5,
+-    type => $Mail::SpamAssassin::Conf::CONF_TYPE_DURATIION,
++    type => $Mail::SpamAssassin::Conf::CONF_TYPE_DURATION,
+   });
+ 
+ =item razor_config filename

Added: trunk/mail/spamassassin/files/patch-bug7057
===================================================================
--- trunk/mail/spamassassin/files/patch-bug7057	                        (rev 0)
+++ trunk/mail/spamassassin/files/patch-bug7057	2014-09-12 01:45:46 UTC (rev 16990)
@@ -0,0 +1,15 @@
+--- lib/Mail/SpamAssassin/DnsResolver.pm.orig	2014/06/18 16:47:04	1603517
++++ lib/Mail/SpamAssassin/DnsResolver.pm	2014/06/18 16:48:04	1603518
+@@ -204,8 +204,10 @@
+     @ns_addr_port = @{$self->{conf}->{dns_servers}};
+     dbg("dns: servers set by config to: %s", join(', ', at ns_addr_port));
+   } elsif ($res) {  # default as provided by Net::DNS, e.g. /etc/resolv.conf
+-    @ns_addr_port = map(untaint_var("[$_]:" . $res->{port}),
+-                        @{$res->{nameservers}});
++    my @ns = $res->UNIVERSAL::can('nameservers') ? $res->nameservers
++                                                 : @{$res->{nameservers}};
++    my $port = $res->UNIVERSAL::can('port') ? $res->port : $res->{port};
++    @ns_addr_port = map(untaint_var("[$_]:" . $port), @ns);
+     dbg("dns: servers obtained from Net::DNS : %s", join(', ', at ns_addr_port));
+   }
+   return @ns_addr_port;

Added: trunk/mail/spamassassin/files/patch-bug7065
===================================================================
--- trunk/mail/spamassassin/files/patch-bug7065	                        (rev 0)
+++ trunk/mail/spamassassin/files/patch-bug7065	2014-09-12 01:45:46 UTC (rev 16990)
@@ -0,0 +1,11 @@
+--- lib/Mail/SpamAssassin/BayesStore/DBM.pm.orig	2014-07-06 08:33:29.000000000 -0400
++++ lib/Mail/SpamAssassin/BayesStore/DBM.pm	2014-07-06 08:35:04.000000000 -0400
+@@ -812,7 +812,7 @@
+   return 0 if ($conf->{bayes_journal_max_size} == 0);
+ 
+   my @vars = $self->get_storage_variables();
+-  dbg("bayes: DB journal sync: last sync: ".$vars[7],'bayes','-1');
++  dbg("bayes: DB journal sync: last sync: %s", $vars[7]);
+ 
+   ## Ok, should we do a sync?
+ 

Deleted: trunk/mail/spamassassin/files/pkg-install.in
===================================================================
--- trunk/mail/spamassassin/files/pkg-install.in	2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/files/pkg-install.in	2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,77 +0,0 @@
-#!/bin/sh
-#
-# $FreeBSD$
-#
-
-USER=%%USER%%
-GROUP=%%GROUP%%
-INSTALL="%%INSTALL%%"
-PREFIX=%%PREFIX%%
-
-if [ "$2" = "PRE-INSTALL" ];then exit; fi
-
-if [ -z "${INSTALL}" ];then
-echo "report this problem to scheidell at freebsd.org, $*"
-exit 1
-fi
-
-if [ "$2" = "POST-INSTALL" ];then 
-ask() {
-        local question default answer
-
-        question=$1
-        default=$2
-        if [ -z "${PACKAGE_BUILDING}" -a -z "${BATCH}" ]; then
-                read -t120 -p "${question} [${default}]? " answer
-        fi
-        echo ${answer:-${default}}
-}
-
-yesno() {
-        local question default answer
-
-        question=$1
-        default=$2
-        while :; do
-                answer=$(ask "${question}" "${default}")
-                case "${answer}" in
-                [Yy]*)  return 0;;
-                [Nn]*)  return 1;;
-                esac
-                echo "Please answer yes or no."
-        done
-}
-
-    # Create pid directory
-
-    ${INSTALL} -d -o ${USER} -g ${GROUP} /var/run/spamd
-    ${PREFIX}/bin/spamassassin -x -L --lint
-    if [ ${?} -ne 0 ];then
-        echo "
-*******************************************************
-* _  _  _ _______  ______ __   _ _____ __   _  ______ *
-* |  |  | |_____| |_____/ | \  |   |   | \  | |  ____ *
-* |__|__| |     | |    \_ |  \_| __|__ |  \_| |_____| *
-*                                                     *
-*******************************************************
-*    You must install rules before starting spamd!    *
-*******************************************************"
-        if [ -z "${PACKAGE_BUILDING}" -a -z "${BATCH}" ]; then
-           if yesno "Do you wish to run sa-update to fetch new rules" "N";then
-              ${PREFIX}/bin/sa-update || true
-	   else
-              echo ""
-           fi
-           ${PREFIX}/bin/spamassassin -x -L --lint
-           if [ ${?} -eq 0 ] && grep '^load.*Rule2XSBody' ${PREFIX}/etc/mail/spamassassin/v320.pre > /dev/null ;then
-              if yesno "Do you wish to compile rules with re2c (will take a long time)" "N";then
-                ${PREFIX}/bin/sa-compile || true
-        fi
-    fi
-       fi
-    fi
-
-    exit 0
-fi # post-install
-
-exit 0

Added: trunk/mail/spamassassin/files/pkg-message.in
===================================================================
--- trunk/mail/spamassassin/files/pkg-message.in	                        (rev 0)
+++ trunk/mail/spamassassin/files/pkg-message.in	2014-09-12 01:45:46 UTC (rev 16990)
@@ -0,0 +1,22 @@
+You should complete the following post-installation tasks:
+
+	1) Read %%DOCSDIR%%/INSTALL
+	   and %%DOCSDIR%%/UPGRADE
+	   BEFORE enabling SpamAssassin for important changes
+	
+	2) Edit the configuration in %%ETCDIR%%,
+	   in particular %%ETCDIR%%/init.pre
+	   You may get lots of annoying (but harmless) error messages
+	   if you skip this step.
+	
+	3) To run spamd, add the following to /etc/rc.conf:
+	   spamd_enable="YES"
+
+	4) Install mail/spamass-rules if you want some third-party
+	   spam-catching rulesets
+
+SECURITY NOTE:
+By default, spamd runs as root (the AS_ROOT option). If you wish
+to change this, add the following to /etc/rc.conf:
+
+	spamd_flags="-u spamd -H /var/spool/spamd"

Modified: trunk/mail/spamassassin/files/sa-spamd.in
===================================================================
--- trunk/mail/spamassassin/files/sa-spamd.in	2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/files/sa-spamd.in	2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,7 +1,6 @@
 #!/bin/sh
 #
-# $FreeBSD$
-#
+# $MidnightBSD$
 
 # PROVIDE: spamd
 # REQUIRE: LOGIN
@@ -9,35 +8,48 @@
 # KEYWORD: shutdown
 
 #
-# Add the following lines to /etc/rc.conf to enable spamd:
+# Add the following line to /etc/rc.conf to enable spamd:
 #
-#spamd_enable="YES"
+#   spamd_enable="YES"
 #
-# See spamd(8) for flags
+# You can pass flags to spamd with spamd_flags="..."
+# To change the user that spamd runs as, use
 #
+#    spamd_flags="-u USER [-H /path/to/home... we suggest /var/spool/spamd]"
+#
+# To keep your user-config in a SQL database, use
+#
+#	 spamd_flags="-Q"
+#
+# and remove -c (auto-create user preference files).
+#
 
 . /etc/rc.subr
 
 name=spamd
-rcvar=spamd_enable
+rcvar=${name}_enable
 
 extra_commands="reload"
 load_rc_config $name
 
+start_precmd="precmd"
+restart_precmd="precmd"
+
 # Set defaults
 : ${spamd_enable:="NO"}
 : ${spamd_flags="-c %%SQL_FLAG%% %%RUN_AS_USER%%"}
 
-pidfile=${spamd_pidfile:-"/var/run/spamd/spamd.pid"}
-command=%%PREFIX%%/bin/spamd
+pidfile=${spamd_pidfile:-"/var/run/${name}/${name}.pid"}
+command=%%PREFIX%%/bin/${name}
 command_args="-d -r ${pidfile}"
-required_dirs=%%PREFIX%%/share/spamassassin
+required_dirs="%%PREFIX%%/share/spamassassin"
 
-stop_postcmd=stop_postcmd
-
-stop_postcmd()
+precmd()
 {
-  rm -f $pidfile
+	if [ ! -d /var/run/${name} ]; then
+		mkdir -p /var/run/${name}
+		chown %%SPAMD_OWN%% /var/run/${name}
+	fi
 }
 
 run_rc_command "$1"

Deleted: trunk/mail/spamassassin/pkg-deinstall
===================================================================
--- trunk/mail/spamassassin/pkg-deinstall	2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/pkg-deinstall	2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,13 +0,0 @@
-#!/bin/sh
-
-if [ "$2" != "POST-DEINSTALL" ]; then
-    exit 0
-fi
-
-USER=spamd
-
-if pw usershow "${USER}" 2>/dev/null 1>&2; then
-	echo "To delete ${USER} user permanently, use 'rmuser ${USER}'"
-fi
-
-exit 0

Modified: trunk/mail/spamassassin/pkg-descr
===================================================================
--- trunk/mail/spamassassin/pkg-descr	2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/pkg-descr	2014-09-12 01:45:46 UTC (rev 16990)
@@ -11,4 +11,4 @@
 Additional drop-in rule sets are available at
 http://wiki.apache.org/spamassassin/CustomRulesets
 
-WWW:	http://spamassassin.apache.org/
+WWW: http://spamassassin.apache.org/

Deleted: trunk/mail/spamassassin/pkg-install
===================================================================
--- trunk/mail/spamassassin/pkg-install	2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/pkg-install	2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,89 +0,0 @@
-#!/bin/sh
-PKG_PREFIX=${PKG_PREFIX:-/usr/local}
-USER=spamd
-GROUP=${USER}
-UID=58
-GID=${UID}
-HOME=/var/spool/${USER}
-
-if [ "$2" = "POST-INSTALL" ];then
-ask() {
-        local question default answer
-
-        question=$1
-        default=$2
-        if [ -z "${PACKAGE_BUILDING}" -a -z "${BATCH}" ]; then
-                read -t120 -p "${question} [${default}]? " answer
-        fi
-        echo ${answer:-${default}}
-}
-
-yesno() {
-        local question default answer
-
-        question=$1
-        default=$2
-        while :; do
-                answer=$(ask "${question}" "${default}")
-                case "${answer}" in
-                [Yy]*)  return 0;;
-                [Nn]*)  return 1;;
-                esac
-                echo "Please answer yes or no."
-        done
-}
-    if ! pw groupshow "${GROUP}" 2>/dev/null 1>&2; then
-    	if pw groupadd ${GROUP} -g ${GID}; then
-    		echo "Added group \"${GROUP}\"."
-    	else
-    		echo "Adding group \"${GROUP}\" failed..."
-    		exit 1
-    	fi
-    fi
-    
-    if ! pw usershow "${USER}" 2>/dev/null 1>&2; then
-    	if pw useradd ${USER} -u ${UID} -g ${GROUP} -h - \
-    		-s "/sbin/nologin" -d "${HOME}" \
-    		-c "SpamAssassin user"; \
-    	then
-    		echo "Added user \"${USER}\"."
-    		mkdir ${HOME} && chown ${USER}:${GROUP} ${HOME}
-    	else
-    		echo "Adding user \"${USER}\" failed..."
-    		exit 1
-    	fi
-    fi
-    
-    # Create pid directory
-    mkdir /var/run/spamd 2> /dev/null && chown ${USER}:${GROUP} /var/run/spamd
-    /usr/bin/su root -c "${PKG_PREFIX}/bin/spamassassin -x -L --lint"
-    
-    if [ ${?} -eq 255 ];then
-        echo "***********************************************"
-        echo "*__        ___    ____  _   _ ___ _   _  ____ *"
-        echo "*\ \      / / \  |  _ \| \ | |_ _| \ | |/ ___|*"
-        echo "* \ \ /\ / / _ \ | |_) |  \| || ||  \| | |  _ *"
-        echo "*  \ V  V / ___ \|  _ <| |\  || || |\  | |_| |*"
-        echo "*   \_/\_/_/   \_\_| \_\_| \_|___|_| \_|\____|*"
-        echo "*                                             *"
-        echo "*You must install rules before starting spamd!*"
-        echo "***********************************************"
-        if [ -z "${PACKAGE_BUILDING}" -a -z "${BATCH}" ]; then
-           if yesno "Do you wish to run sa-update to fetch new rules" "N";then
-              ${PKG_PREFIX}/bin/sa-update || true
-	   else
-              echo ""
-           fi
-           /usr/bin/su root -c  "${PKG_PREFIX}/bin/spamassassin -x -L --lint"
-           if [ ${?} -eq 0 ] && grep '^load.*Rule2XSBody' ${PKG_PREFIX}/etc/mail/spamassassin/v320.pre > /dev/null ;then
-              if yesno "Do you wish to compile rules with re2c (will take a long time)" "N";then
-                ${PKG_PREFIX}/bin/sa-compile || true
-        fi
-    fi
-       fi
-    fi
-    
-    exit 0
-fi  # post-install
-
-exit 0

Deleted: trunk/mail/spamassassin/pkg-message
===================================================================
--- trunk/mail/spamassassin/pkg-message	2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/pkg-message	2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,38 +0,0 @@
-*************************************************************************
-*	    _  _____ _____ _____ _   _ _____ ___ ___  _   _ 		*
-*	   / \|_   _|_   _| ____| \ | |_   _|_ _/ _ \| \ | |		*
-*	  / _ \ | |   | | |  _| |  \| | | |  | | | | |  \| |		*
-*	 / ___ \| |   | | | |___| |\  | | |  | | |_| | |\  |		*
-*	/_/   \_\_|   |_| |_____|_| \_| |_| |___\___/|_| \_|		*
-*									*
-*	See PREFIX/share/doc/p5-Mail-SpamAssassin/INSTALL,		*
-*	and PREFIX/share/doc/p5-Mail-SpamAssassin/UPGRADE,		*
-*	or http://spamassassin.org/dist/INSTALL and			*
-*	http://spamassassin.org/dist/UPGRADE BEFORE enabling		*
-*	this version of SpamAssassin for important information		*
-*	regarding changes in this version.				*
-*									*
-*	SpamAssassin may require additional configuration in		*
-*	PREFIX/etc/mail/spamassassin/init.pre depending on		*
-*	the options you have installed.	 Otherwise, annoying		*
-*	(but harmless) error messages may result.  Read the		*
-*	files listed above.						*
-*									*
-*************************************************************************
-You may wish to run sa-update now to obtain the latest rules.
-
-NOTE:  BSD users: If you are updating from a version prior to 3.20.
-sa-update now places state files in /var/db/spamassassin and not 
-/var/lib/spamassassin. 
-
-If you run sa-compile, you will notice that files are in 
-/var/db/spamassassin/compiled/<perlversion>/<version> instead of
-/var/db/spamassassin/compiled/<version>.
-No attempts have been made to move old versions over. You must recompile.
-
-If you are running with spamd, you must add the following to rc.conf:
-spamd_enable="YES"
-
-Security Note:  If you did NOT deselected AS_ROOT, spamd will be running
-as root. To change this, also add this to rc.conf:
-spamd_flags="-u spamd -H /var/spool/spamd"

Modified: trunk/mail/spamassassin/pkg-plist
===================================================================
--- trunk/mail/spamassassin/pkg-plist	2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/pkg-plist	2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,4 +1,4 @@
- at stopdaemon sa-spamd
+ at unexec if service sa-spamd status | grep -q "spamd is running"; then service sa-spamd stop; fi
 bin/sa-awl
 bin/sa-check_spamd
 bin/sa-compile
@@ -7,28 +7,96 @@
 bin/spamassassin
 bin/spamc
 bin/spamd
- at unexec rm -rf %D/etc/mail/spamassassin/sa-update-keys || true
-etc/mail/spamassassin/local.cf.sample
- at unexec if cmp -s %B/init.pre.sample %B/init.pre; then rm -f %B/init.pre; fi
-etc/mail/spamassassin/init.pre.sample
- at exec [ -f %B/init.pre ] || cp %B/%f %B/init.pre
- at unexec if cmp -s %B/v310.pre.sample %B/v310.pre; then rm -f %B/v310.pre; fi
-etc/mail/spamassassin/v310.pre.sample
- at exec [ -f %B/v310.pre ] || cp %B/%f %B/v310.pre
- at unexec if cmp -s %B/v312.pre.sample %B/v312.pre; then rm -f %B/v312.pre; fi
-etc/mail/spamassassin/v312.pre.sample
- at exec [ -f %B/v312.pre ] || cp %B/%f %B/v312.pre
- at unexec if cmp -s %B/v320.pre.sample %B/v320.pre; then rm -f %B/v320.pre; fi
-etc/mail/spamassassin/v320.pre.sample
- at exec [ -f %B/v320.pre ] || cp %B/%f %B/v320.pre
- at unexec if cmp -s %B/v330.pre.sample %B/v330.pre; then rm -f %B/v330.pre;fi
-etc/mail/spamassassin/v330.pre.sample
- at exec [ -f %B/v330.pre ] || cp %B/%f %B/v330.pre
+ at unexec rm -rf %D/%%ETCDIR%%/sa-update-keys 2>&1 >/dev/null || true
+ at sample %%ETCDIR%%/local.cf.sample
+ at sample %%ETCDIR%%/init.pre.sample
+ at sample %%ETCDIR%%/v310.pre.sample
+ at sample %%ETCDIR%%/v312.pre.sample
+ at sample %%ETCDIR%%/v320.pre.sample
+ at sample %%ETCDIR%%/v330.pre.sample
+ at sample %%ETCDIR%%/v340.pre.sample
 include/libspamc.h
 lib/libspamc.so
 lib/libspamc.so.0
 %%SSL%%lib/libsslspamc.so
 %%SSL%%lib/libsslspamc.so.0
+%%PERL5_MAN3%%/Mail::SpamAssassin.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::AICache.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::ArchiveIterator.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::AsyncLoop.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::AutoWhitelist.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Bayes.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::BayesStore.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::BayesStore::BDB.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::BayesStore::MySQL.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::BayesStore::PgSQL.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::BayesStore::Redis.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::BayesStore::SQL.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Client.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Conf.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Conf::LDAP.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Conf::Parser.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Conf::SQL.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::DnsResolver.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Logger.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Logger::File.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Logger::Stderr.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Logger::Syslog.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Message.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Message::Metadata.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Message::Node.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::PerMsgLearner.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::PerMsgStatus.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::PersistentAddrList.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::ASN.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::AWL.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::AccessDB.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::AntiVirus.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::AskDNS.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::AutoLearnThreshold.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Bayes.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::BodyRuleBaseExtractor.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Check.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::DCC.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::DKIM.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::DNSEval.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Hashcash.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::MIMEHeader.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::OneLineBodyRuleType.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::PhishTag.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Pyzor.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Razor2.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::RelayCountry.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::ReplaceTags.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Reuse.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Rule2XSBody.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::SPF.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Shortcircuit.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::SpamCop.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Test.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::TextCat.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::URIDNSBL.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::URIDetail.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::VBounce.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::WhiteListSubject.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::PluginHandler.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::SQLBasedAddrList.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::SubProcBackChannel.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Timeout.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Util.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Util::DependencyInfo.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Util::Progress.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Util::RegistrarBoundaries.3.gz
+%%PERL5_MAN3%%/spamassassin-run.3.gz
+man/man1/sa-awl.1.gz
+man/man1/sa-compile.1.gz
+man/man1/sa-learn.1.gz
+man/man1/sa-update.1.gz
+man/man1/spamassassin-run.1.gz
+man/man1/spamassassin.1.gz
+man/man1/spamc.1.gz
+man/man1/spamd.1.gz
 %%SITE_PERL%%/Mail/SpamAssassin.pm
 %%SITE_PERL%%/Mail/SpamAssassin/AICache.pm
 %%SITE_PERL%%/Mail/SpamAssassin/ArchiveIterator.pm
@@ -42,6 +110,7 @@
 %%SITE_PERL%%/Mail/SpamAssassin/BayesStore/DBM.pm
 %%SITE_PERL%%/Mail/SpamAssassin/BayesStore/MySQL.pm
 %%SITE_PERL%%/Mail/SpamAssassin/BayesStore/PgSQL.pm
+%%SITE_PERL%%/Mail/SpamAssassin/BayesStore/Redis.pm
 %%SITE_PERL%%/Mail/SpamAssassin/BayesStore/SDBM.pm
 %%SITE_PERL%%/Mail/SpamAssassin/BayesStore/SQL.pm
 %%SITE_PERL%%/Mail/SpamAssassin/Client.pm
@@ -77,6 +146,7 @@
 %%SITE_PERL%%/Mail/SpamAssassin/Plugin/AWL.pm
 %%SITE_PERL%%/Mail/SpamAssassin/Plugin/AccessDB.pm
 %%SITE_PERL%%/Mail/SpamAssassin/Plugin/AntiVirus.pm
+%%SITE_PERL%%/Mail/SpamAssassin/Plugin/AskDNS.pm
 %%SITE_PERL%%/Mail/SpamAssassin/Plugin/AutoLearnThreshold.pm
 %%SITE_PERL%%/Mail/SpamAssassin/Plugin/Bayes.pm
 %%SITE_PERL%%/Mail/SpamAssassin/Plugin/BodyEval.pm
@@ -125,16 +195,12 @@
 %%SITE_PERL%%/Mail/SpamAssassin/Util/RegistrarBoundaries.pm
 %%SITE_PERL%%/Mail/SpamAssassin/Util/ScopedTimer.pm
 %%SITE_PERL%%/Mail/SpamAssassin/Util/TieOneStringHash.pm
+%%SITE_PERL%%/Mail/SpamAssassin/Util/TinyRedis.pm
 %%SITE_PERL%%/%%PERL_ARCH%%/auto/Mail/SpamAssassin/.packlist
 %%SITE_PERL%%/spamassassin-run.pod
 %%DATADIR%%/languages
 %%DATADIR%%/sa-update-pubkey.txt
 %%DATADIR%%/user_prefs.template
- at unexec rm -rf /var/spool/spamd
- at unexec rm -rf /var/lib/spamassassin/2* || true
- at unexec rmdir /var/lib/spamassassin 2>/dev/null  || true
- at unexec rmdir /var/lib 2>/dev/null || true
- at unexec rmdir /var/db/spamassassin 2>/dev/null || true
 @dirrm %%DATADIR%%
 @dirrm %%SITE_PERL%%/%%PERL_ARCH%%/auto/Mail/SpamAssassin
 @dirrmtry %%SITE_PERL%%/%%PERL_ARCH%%/auto/Mail
@@ -149,6 +215,23 @@
 @dirrm %%SITE_PERL%%/Mail/SpamAssassin/Bayes
 @dirrm %%SITE_PERL%%/Mail/SpamAssassin
 @dirrmtry %%SITE_PERL%%/Mail
- at dirrmtry etc/mail/spamassassin
+ at dirrmtry %%ETCDIR%%
 @dirrmtry etc/mail
- at unexec rm -rf /var/run/spamd || true
+
+ at unexec rm -rf /var/lib/spamassassin/2* 2>&1 >/dev/null || true
+ at dirrmtry /var/lib/spamassassin
+ at dirrmtry /var/lib
+ at dirrmtry /var/db/spamassassin
+
+ at unexec [ -d /var/db/spamassassin ] && echo "If you are no longer using SpamAssassin, remove /var/db/spamassassin"
+ at unexec pw usershow "%%USER%%" 2>/dev/null 1>&2 && echo "To delete %%USER%% permanently, 'rmuser %%USER%%'"
+ at unexec pw usershow "%%USER%%" 2>/dev/null 1>&2 && [ -d /var/spool/spamd ] && echo "    Note that this will remove /var/spool/spamd"
+
+ at owner %%USER%%
+ at group %%GROUP%%
+ at dirrmtry /var/run/spamd
+ at group
+ at owner
+
+ at exec if [ "%%UPDATE_ON_INSTALL%%" = "yes" ]; then echo "====> Downloading SpamAssassin rulesets"; %%PREFIX%%/bin/spamassassin -x -L --lint; %%PREFIX%%/bin/sa-update || true; fi
+ at exec if [ "%%UPDATE_ON_INSTALL%%" = "yes" ]; then echo "====> Compiling SpamAssassin rulesets"; %%PREFIX%%/bin/spamassassin -x -L --lint; %%PREFIX%%/bin/sa-compile || true; fi



More information about the Midnightbsd-cvs mailing list