[Midnightbsd-cvs] mports [16990] trunk/mail/spamassassin: spamassassin 3.4.0
laffer1 at midnightbsd.org
laffer1 at midnightbsd.org
Thu Sep 11 21:45:47 EDT 2014
Revision: 16990
http://svnweb.midnightbsd.org/mports/?rev=16990
Author: laffer1
Date: 2014-09-11 21:45:46 -0400 (Thu, 11 Sep 2014)
Log Message:
-----------
spamassassin 3.4.0
Modified Paths:
--------------
trunk/mail/spamassassin/Makefile
trunk/mail/spamassassin/distinfo
trunk/mail/spamassassin/files/sa-spamd.in
trunk/mail/spamassassin/pkg-descr
trunk/mail/spamassassin/pkg-plist
Added Paths:
-----------
trunk/mail/spamassassin/files/3.4.0-RELEASE-NOTES.txt
trunk/mail/spamassassin/files/patch-UPGRADE
trunk/mail/spamassassin/files/patch-bug7018
trunk/mail/spamassassin/files/patch-bug7057
trunk/mail/spamassassin/files/patch-bug7065
trunk/mail/spamassassin/files/pkg-message.in
Removed Paths:
-------------
trunk/mail/spamassassin/files/manpages
trunk/mail/spamassassin/files/patch-bug6624
trunk/mail/spamassassin/files/patch-bug6655
trunk/mail/spamassassin/files/patch-bug6698
trunk/mail/spamassassin/files/pkg-install.in
trunk/mail/spamassassin/pkg-deinstall
trunk/mail/spamassassin/pkg-install
trunk/mail/spamassassin/pkg-message
Modified: trunk/mail/spamassassin/Makefile
===================================================================
--- trunk/mail/spamassassin/Makefile 2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/Makefile 2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,298 +1,178 @@
# $MidnightBSD$
-PORTNAME= Mail-SpamAssassin
-PORTVERSION= 3.3.2
-PORTREVISION= 1
-CATEGORIES= mail perl5
+PORTNAME= spamassassin
+PORTVERSION= 3.4.0
+PORTREVISION?= 0
+CATEGORIES?= mail perl5
MASTER_SITES= ${MASTER_SITE_APACHE:S/$/:apache/} ${MASTER_SITE_PERL_CPAN:S/$/:cpan/}
MASTER_SITE_SUBDIR= spamassassin/source/:apache Mail/:cpan
-PKGNAMEPREFIX= p5-
+DISTNAME= Mail-SpamAssassin-${PORTVERSION}
DISTFILES= ${DISTNAME}${EXTRACT_SUFX}:apache,cpan
-MAINTAINER= ports at MidnightBSD.org
-COMMENT= A highly efficient mail filter for identifying spam
+MAINTAINER?= ports at MidnightBSD.org
+COMMENT?= Highly efficient mail filter for identifying spam
+
LICENSE= apache2
-RUN_DEPENDS= p5-NetAddr-IP>=4.00.7:${PORTSDIR}/net-mgmt/p5-NetAddr-IP \
+ALL_DEPENDS= p5-Encode-Detect>=0:${PORTSDIR}/converters/p5-Encode-Detect \
+ p5-HTML-Parser>=3.46:${PORTSDIR}/www/p5-HTML-Parser \
+ p5-HTTP-Date>=0:${PORTSDIR}/www/p5-HTTP-Date \
+ p5-IO-Socket-IP>=0:${PORTSDIR}/net/p5-IO-Socket-IP \
p5-Net-DNS>=0.63:${PORTSDIR}/dns/p5-Net-DNS \
- p5-HTML-Parser>=3.46:${PORTSDIR}/www/p5-HTML-Parser \
- ${SITE_PERL}/Bundle/LWP.pm:${PORTSDIR}/www/p5-libwww \
- ${SITE_PERL}/${PERL_ARCH}/Encode/Detect.pm:${PORTSDIR}/converters/p5-Encode-Detect \
- ${SITE_PERL}/Mail/Internet.pm:${PORTSDIR}/mail/p5-Mail-Tools
+ p5-NetAddr-IP>=4.010:${PORTSDIR}/net-mgmt/p5-NetAddr-IP
+BUILD_DEPENDS= ${ALL_DEPENDS}
+RUN_DEPENDS= ${ALL_DEPENDS} \
+ re2c>=.12.0:${PORTSDIR}/devel/re2c
-BUILD_DEPENDS= ${RUN_DEPENDS}
+CPE_VENDOR= apache
+USES= cpe
+USE_PERL5= yes
PERL_CONFIGURE= yes
-USE_PERL5_RUN= 5.12+
USE_LDCONFIG= yes
-CONFIGURE_ARGS= SYSCONFDIR="${PREFIX}/etc" \
- CONTACT_ADDRESS="${CONTACT_ADDRESS}" \
- LOCALSTATEDIR="/var/db/spamassassin"
-# You can override it if you like
-CONTACT_ADDRESS?= The administrator of that system
+DATADIR= ${PREFIX}/share/spamassassin
+DBDIR?= /var/db
+DOCSDIR= ${PREFIX}/share/doc/${PKGNAMEPREFIX}${PORTNAME}
+ETCDIR?= ${PREFIX}/etc/mail/spamassassin
-OPTIONS= AS_ROOT "Run spamd as root (recommended)" on \
- SPAMC "Build spamd/spamc (not for amavisd)" on \
- SACOMPILE "sa-compile" off \
- DKIM "DKIM/DomainKeys Identified Mail" on \
- SSL "Build with SSL support for spamd/spamc" on \
- GNUPG "Install GnuPG (for sa-update)" on \
- MYSQL "Add MySQL support" off \
- PGSQL "Add PostreSQL support" off \
- RAZOR "Add Vipul's Razor support" on \
- SPF_QUERY "Add SPF query support" off \
- RELAY_COUNTRY "Relay country support" off \
- DCC "Add DCC support (see LICENSE)" off
+SPAMASSASSIN_CONTACT_ADDRESS?= The administrator of that system
+USERS?= spamd
+GROUPS?= spamd
+CONFIGURE_ARGS= SYSCONFDIR="${PREFIX}/etc" \
+ CONTACT_ADDRESS="${SPAMASSASSIN_CONTACT_ADDRESS}" \
+ LOCALSTATEDIR="${DBDIR}/spamassassin" \
+ BUILD_SPAMC=yes
-.if !defined(WITHOUT_SSL)
-USE_OPENSSL= yes
-.endif
+OPTIONS_DEFINE= AS_ROOT GNUPG SSL UPDATE_AND_COMPILE
+OPTIONS_GROUP= DATABASE PLUGINS
+OPTIONS_GROUP_DATABASE= MYSQL PGSQL
+OPTIONS_GROUP_PLUGINS= DCC DKIM PYZOR RAZOR RELAY_COUNTRY SPF_QUERY
+OPTIONS_DEFAULT= AS_ROOT GNUPG SSL UPDATE_AND_COMPILE
-.include <bsd.port.pre.mk>
+AS_ROOT_DESC= Run spamd as root (recommended)
+GNUPG_DESC= Install GnuPG (for sa-update, optional)
+SSL_DESC= Build spamd/spamc with SSL support
+UPDATE_AND_COMPILE_DESC=Download and compile rulesets (recommended)
-.if defined (WITH_SPAMC)
-CONFIGURE_ARGS+= BUILD_SPAMC=yes
-.else
-CONFIGURE_ARGS+= BUILD_SPAMC=no
-WITH_AS_ROOT=
-WITHOUT_SSL=1
-.endif
+DATABASE_DESC= Optional user-config/bayes database backends
-.if defined(WITH_SPF_QUERY)
-RUN_DEPENDS+= ${SITE_PERL}/Mail/SPF.pm:${PORTSDIR}/mail/p5-Mail-SPF
-.endif
-.if !defined(WITHOUT_IPV6)
-RUN_DEPENDS+= ${SITE_PERL}/IO/Socket/INET6.pm:${PORTSDIR}/net/p5-IO-INET6
-.endif
+PLUGINS_DESC= Optional SpamAssassin plugins
+DCC_DESC= DCC digest list support (mail/dcc-dccd)
+DKIM_DESC= Verify DKIM records (mail/p5-Mail-DKIM)
+PYZOR_DESC= Pyzor digest list support (mail/pyzor)
+RAZOR_DESC= Vipul's Razor digest list support (mail/razor-agents)
+RELAY_COUNTRY_DESC= Location-based scoring (net/p5-Geo-IP)
+SPF_QUERY_DESC= Verify SPF records (mail/p5-Mail-SPF)
-.if !defined(WITHOUT_SSL)
-EXTENSIONS+= openssl
-RUN_DEPENDS+= ${SITE_PERL}/IO/Socket/SSL.pm:${PORTSDIR}/security/p5-IO-Socket-SSL
-CFLAGS+= -I${OPENSSLINC}
-LDFLAGS+= -L${OPENSSLLIB}
-CONFIGURE_ARGS+= ENABLE_SSL=yes
-PLIST_SUB+= SSL=""
-.else
-CONFIGURE_ARGS+= ENABLE_SSL=no
-PLIST_SUB+= SSL="@comment "
-.endif
+SUB_FILES= pkg-message
+SUB_LIST+= SPAMD_OWN="${USERS}:${GROUPS}"
+PLIST_SUB+= USER=${USERS} GROUP=${GROUPS}
+OPTIONS_SUB= yes
-.if !defined(WITHOUT_GNUPG)
-RUN_DEPENDS+= gnupg>=1.4.7:${PORTSDIR}/security/gnupg
-.endif
+DCC_RUN_DEPENDS= dcc-dccd>=1.3.111:${PORTSDIR}/mail/dcc-dccd
+DKIM_RUN_DEPENDS= p5-IO-Socket-SSL>=0:${PORTSDIR}/security/p5-IO-Socket-SSL \
+ p5-Mail-DKIM>=0.37:${PORTSDIR}/mail/p5-Mail-DKIM \
+ p5-Crypt-OpenSSL-RSA>=0.26_1:${PORTSDIR}/security/p5-Crypt-OpenSSL-RSA
+GNUPG_RUN_DEPENDS= gnupg1>=1.4.7:${PORTSDIR}/security/gnupg1
+MYSQL_RUN_DEPENDS= p5-DBD-mysql>=0:${PORTSDIR}/databases/p5-DBD-mysql
+PGSQL_RUN_DEPENDS= p5-DBD-Pg>=0:${PORTSDIR}/databases/p5-DBD-Pg
+PYZOR_RUN_DEPENDS= pyzor:${PORTSDIR}/mail/pyzor
+RAZOR_RUN_DEPENDS= razor-agents>=2.84:${PORTSDIR}/mail/razor-agents
+RELAY_COUNTRY_RUN_DEPENDS= p5-Geo-IP>=0:${PORTSDIR}/net/p5-Geo-IP
+SPF_QUERY_RUN_DEPENDS= p5-Mail-SPF>=0:${PORTSDIR}/mail/p5-Mail-SPF
-.if defined(WITH_MYSQL)
-RUN_DEPENDS+= ${SITE_PERL}/${PERL_ARCH}/DBD/mysql.pm:${PORTSDIR}/databases/p5-DBD-mysql
-.endif
+SSL_USE= OPENSSL=yes
+SSL_RUN_DEPENDS= p5-IO-Socket-SSL>=0:${PORTSDIR}/security/p5-IO-Socket-SSL
+SSL_CONFIGURE_ON= ENABLE_SSL=yes
+SSL_CONFIGURE_OFF= ENABLE_SSL=no
-.if defined(WITH_PGSQL)
-RUN_DEPENDS+= ${SITE_PERL}/${PERL_ARCH}/DBD/Pg.pm:${PORTSDIR}/databases/p5-DBD-Pg
-.endif
+# plugin names in rules/*.pre, for enabling/disabling
+DCC_INITVAR= DCC
+DKIM_INITVAR= DKIM
+PYZOR_INITVAR= Pyzor
+RAZOR_INITVAR= Razor2
+RELAY_COUNTRY_INITVAR= RelayCountry
+SPF_QUERY_INITVAR= SPF
+UPDATE_AND_COMPILE_INITVAR= Rule2XSBody
-.if defined(WITH_RAZOR)
-RUN_DEPENDS+= razor-agents>=2.84:${PORTSDIR}/mail/razor-agents
-.else
-.if ${PERL_LEVEL} < 501000
-.if !defined(WITH_DKIM)
-RUN_DEPENDS+= p5-Digest-SHA1>=2.11:${PORTSDIR}/security/p5-Digest-SHA1
-.endif
-.endif
-.endif
+DOCS= CREDITS Changes INSTALL NOTICE PACKAGING README TRADEMARK UPGRADE USAGE procmailrc.example 3.4.0-RELEASE-NOTES.txt
+DOCSSQL= README README.awl README.bayes awl_mysql.sql awl_pg.sql bayes_mysql.sql bayes_pg.sql userpref_mysql.sql userpref_pg.sql
+DOCSLDAP= README README.testing sa_test.ldif
+PORTDOCS= ${DOCS} sql ldap
-.if defined(WITH_DKIM)
-RUN_DEPENDS+= ${SITE_PERL}/IO/Socket/SSL.pm:${PORTSDIR}/security/p5-IO-Socket-SSL
-. if ${PERL_LEVEL} < 501000
-RUN_DEPENDS+= ${SITE_PERL}/${PERL_ARCH}/Digest/SHA.pm:${PORTSDIR}/security/p5-Digest-SHA
-. endif
-RUN_DEPENDS+= p5-Mail-DKIM>=0.37:${PORTSDIR}/mail/p5-Mail-DKIM
-RUN_DEPENDS+= p5-Crypt-OpenSSL-RSA>=0.24:${PORTSDIR}/security/p5-Crypt-OpenSSL-RSA
-.endif
+USE_RC_SUBR= sa-spamd
-.if defined(WITH_SACOMPILE)
-RUN_DEPENDS+= re2c:${PORTSDIR}/devel/re2c
-.endif
+ALL_TARGET= all spamc/libspamc.so
-.if defined(WITH_RELAY_COUNTRY)
-RUN_DEPENDS+= ${SITE_PERL}/IP/Country/Fast.pm:${PORTSDIR}/net/p5-IP-Country
-.endif
+.include <bsd.port.pre.mk>
-.if defined(WITH_DCC)
-RUN_DEPENDS+= dcc-dccd>=1.3.111:${PORTSDIR}/mail/dcc-dccd
+.if ${PORT_OPTIONS:MSSL}
+CFLAGS+= -I${OPENSSLINC}
+LDFLAGS+= -L${OPENSSLLIB}
+ALL_TARGET+= spamc/libsslspamc.so
.endif
-MAN3= Mail::SpamAssassin.3 \
- Mail::SpamAssassin::AICache.3 \
- Mail::SpamAssassin::ArchiveIterator.3 \
- Mail::SpamAssassin::AsyncLoop.3 \
- Mail::SpamAssassin::AutoWhitelist.3 \
- Mail::SpamAssassin::Bayes.3 \
- Mail::SpamAssassin::BayesStore.3 \
- Mail::SpamAssassin::BayesStore::BDB.3 \
- Mail::SpamAssassin::BayesStore::MySQL.3 \
- Mail::SpamAssassin::BayesStore::PgSQL.3 \
- Mail::SpamAssassin::BayesStore::SQL.3 \
- Mail::SpamAssassin::Client.3 \
- Mail::SpamAssassin::Conf.3 \
- Mail::SpamAssassin::Conf::LDAP.3 \
- Mail::SpamAssassin::Conf::Parser.3 \
- Mail::SpamAssassin::Conf::SQL.3 \
- Mail::SpamAssassin::DnsResolver.3 \
- Mail::SpamAssassin::Logger.3 \
- Mail::SpamAssassin::Logger::File.3 \
- Mail::SpamAssassin::Logger::Stderr.3 \
- Mail::SpamAssassin::Logger::Syslog.3 \
- Mail::SpamAssassin::Message.3 \
- Mail::SpamAssassin::Message::Metadata.3 \
- Mail::SpamAssassin::Message::Node.3 \
- Mail::SpamAssassin::PerMsgLearner.3 \
- Mail::SpamAssassin::PerMsgStatus.3 \
- Mail::SpamAssassin::PersistentAddrList.3 \
- Mail::SpamAssassin::Plugin.3 \
- Mail::SpamAssassin::Plugin::ASN.3 \
- Mail::SpamAssassin::Plugin::AWL.3 \
- Mail::SpamAssassin::Plugin::AccessDB.3 \
- Mail::SpamAssassin::Plugin::AntiVirus.3 \
- Mail::SpamAssassin::Plugin::AutoLearnThreshold.3 \
- Mail::SpamAssassin::Plugin::Bayes.3 \
- Mail::SpamAssassin::Plugin::BodyRuleBaseExtractor.3 \
- Mail::SpamAssassin::Plugin::Check.3 \
- Mail::SpamAssassin::Plugin::DCC.3 \
- Mail::SpamAssassin::Plugin::DKIM.3 \
- Mail::SpamAssassin::Plugin::Hashcash.3 \
- Mail::SpamAssassin::Plugin::MIMEHeader.3 \
- Mail::SpamAssassin::Plugin::OneLineBodyRuleType.3 \
- Mail::SpamAssassin::Plugin::PhishTag.3 \
- Mail::SpamAssassin::Plugin::Pyzor.3 \
- Mail::SpamAssassin::Plugin::Razor2.3 \
- Mail::SpamAssassin::Plugin::RelayCountry.3 \
- Mail::SpamAssassin::Plugin::ReplaceTags.3 \
- Mail::SpamAssassin::Plugin::Reuse.3 \
- Mail::SpamAssassin::Plugin::Rule2XSBody.3 \
- Mail::SpamAssassin::Plugin::SPF.3 \
- Mail::SpamAssassin::Plugin::Shortcircuit.3 \
- Mail::SpamAssassin::Plugin::SpamCop.3 \
- Mail::SpamAssassin::Plugin::Test.3 \
- Mail::SpamAssassin::Plugin::TextCat.3 \
- Mail::SpamAssassin::Plugin::URIDNSBL.3 \
- Mail::SpamAssassin::Plugin::URIDetail.3 \
- Mail::SpamAssassin::Plugin::VBounce.3 \
- Mail::SpamAssassin::Plugin::WhiteListSubject.3 \
- Mail::SpamAssassin::PluginHandler.3 \
- Mail::SpamAssassin::SQLBasedAddrList.3 \
- Mail::SpamAssassin::SubProcBackChannel.3 \
- Mail::SpamAssassin::Timeout.3 \
- Mail::SpamAssassin::Util.3 \
- Mail::SpamAssassin::Util::DependencyInfo.3 \
- Mail::SpamAssassin::Util::Progress.3 \
- Mail::SpamAssassin::Util::RegistrarBoundaries.3 \
- spamassassin-run.3
-
-MAN1= spamd.1 spamassassin.1 spamc.1 sa-learn.1 sa-update.1 \
- spamassassin-run.1 sa-compile.1
-
-DOCSDIR= ${PREFIX}/share/doc/${PKGNAMEPREFIX}${PORTNAME}
-DATADIR= ${PREFIX}/share/spamassassin
-DOCS= CREDITS Changes INSTALL LICENSE NOTICE PACKAGING README TRADEMARK UPGRADE USAGE procmailrc.example
-DOCSSQL= README README.awl README.bayes awl_mysql.sql awl_pg.sql bayes_mysql.sql bayes_pg.sql userpref_mysql.sql userpref_pg.sql
-DOCSLDAP= README README.testing sa_test.ldif
-PORTDOCS= ${DOCS} sql ldap
-
-USE_RC_SUBR= sa-spamd
-
-.if defined(WITH_MYSQL) || defined(WITH_PGSQL)
+.if ${PORT_OPTIONS:MMYSQL} || ${PORT_OPTIONS:MPGSQL}
SUB_LIST+= SQL_FLAG="-Q"
.else
SUB_LIST+= SQL_FLAG=""
.endif
-.if !defined(WITH_AS_ROOT)
-SUB_LIST+= RUN_AS_USER="-u spamd -H /var/spool/spamd"
+
+.if empty(PORT_OPTIONS:MAS_ROOT)
+SUB_LIST+= RUN_AS_USER="-u ${USERS} -H /var/spool/spamd"
.else
SUB_LIST+= RUN_AS_USER=""
.endif
-post-patch:
- @${FIND} ${WRKSRC} -name \*.orig -delete
- @${REINPLACE_CMD} -e 's#B_CONFDIR)/local.cf#B_CONFDIR)/local.cf.sample#g' \
- -e 's#B_CONFDIR)/init.pre#B_CONFDIR)/init.pre.sample#g' \
- -e 's#B_CONFDIR)/v310.pre#B_CONFDIR)/v310.pre.sample#g' \
- -e 's#B_CONFDIR)/v312.pre#B_CONFDIR)/v312.pre.sample#g' \
- -e 's#B_CONFDIR)/v320.pre#B_CONFDIR)/v320.pre.sample#g' \
- -e 's#B_CONFDIR)/v330.pre#B_CONFDIR)/v330.pre.sample#g' \
+.if ${PORT_OPTIONS:MUPDATE_AND_COMPILE} && empty(PACKAGE_BUILDING) && empty(BATCH)
+PLIST_SUB+= UPDATE_ON_INSTALL="yes"
+.else
+PLIST_SUB+= UPDATE_ON_INSTALL="no"
+.endif
+
+post-patch::
+ # The 3.4.0 release notes never made it into the tarball
+ ${INSTALL_DATA} ${FILESDIR}/3.4.0-RELEASE-NOTES.txt ${WRKSRC}
+ ${REINPLACE_CMD} -e 's,%%DOCSDIR%%,${DOCSDIR},' ${WRKSRC}/UPGRADE
+
+ ${REINPLACE_CMD} -e 's,B_CONFDIR)/local.cf,B_CONFDIR)/local.cf.sample,g' \
+ -e 's,B_CONFDIR)/init.pre,B_CONFDIR)/init.pre.sample,g' \
+ -e 's,B_CONFDIR)/v310.pre,B_CONFDIR)/v310.pre.sample,g' \
+ -e 's,B_CONFDIR)/v312.pre,B_CONFDIR)/v312.pre.sample,g' \
+ -e 's,B_CONFDIR)/v320.pre,B_CONFDIR)/v320.pre.sample,g' \
+ -e 's,B_CONFDIR)/v330.pre,B_CONFDIR)/v330.pre.sample,g' \
+ -e 's,B_CONFDIR)/v340.pre,B_CONFDIR)/v340.pre.sample,g' \
-e 's/require DBI/0/' \
${WRKSRC}/Makefile.PL
- @${REINPLACE_CMD} -e '/^CC =/d; \
+ ${REINPLACE_CMD} -e '/^CC =/d; \
s|@SSLCFLAGS@|& $${CFLAGS}|g' ${WRKSRC}/spamc/Makefile.in
-.if defined(WITH_RAZOR)
- ${REINPLACE_CMD} -e '/Razor2/s/^#loadplugin/loadplugin/' ${WRKSRC}/rules/v312.pre
-.endif
-.if defined(WITH_RELAY_COUNTRY)
- ${REINPLACE_CMD} -e '/RelayCountry/s/^# ?loadplugin/loadplugin/' ${WRKSRC}/rules/init.pre
-.endif
-.if !defined(WITH_DKIM)
- ${REINPLACE_CMD} -e '/DKIM/s/^loadplugin/#loadplugin/' ${WRKSRC}/rules/v312.pre
-.endif
-.if !defined(WITH_SPF_QUERY)
- ${REINPLACE_CMD} -e '/SPF/s/^loadplugin/#loadplugin/' ${WRKSRC}/rules/init.pre
-.endif
-.if defined(WITH_DCC)
- ${REINPLACE_CMD} -e '/DCC/s/^#loadplugin/loadplugin/' ${WRKSRC}/rules/v310.pre
-.endif
-.if !defined(WITH_AWL)
- ${REINPLACE_CMD} -e '/AWL/s/^loadplugin/#loadplugin/' ${WRKSRC}/rules/v310.pre
-.endif
-.if defined(WITH_SACOMPILE)
- ${REINPLACE_CMD} -e '/Rule2XSBody/s/^# loadplugin/loadplugin/' ${WRKSRC}/rules/v320.pre
-.endif
+.for var in ${OPTIONS_GROUP_PLUGINS} UPDATE_AND_COMPILE
+. if ${PORT_OPTIONS:M${var}}
+ ${REINPLACE_CMD} -e '/${${var}_INITVAR}/s/^\#.*loadplugin/loadplugin/' ${WRKSRC}/rules/*.pre
+. else
+ ${REINPLACE_CMD} -e '/${${var}_INITVAR}/s/^loadplugin/\# loadplugin/' ${WRKSRC}/rules/*.pre
+. endif
+.endfor
+ ${FIND} ${WRKSRC} -name '*.orig' -or -name '*.bak' | ${XARGS} ${RM}
+
pre-install:
- @${MKDIR} ${DATADIR}
-
-post-build:
- @(cd ${BUILD_WRKSRC}; ${SETENV} ${MAKE_ENV} ${MAKE} ${MAKE_FLAGS} ${MAKEFILE} ${MAKE_ARGS} spamc/libspamc.so)
-.if !defined(WITHOUT_SSL)
- @(cd ${BUILD_WRKSRC}; ${SETENV} ${MAKE_ENV} ${MAKE} ${MAKE_FLAGS} ${MAKEFILE} ${MAKE_ARGS} spamc/libsslspamc.so)
+ @${MKDIR} ${STAGEDIR}${DATADIR}
+ ${INSTALL_LIB} ${WRKSRC}/spamc/libspamc.so ${STAGEDIR}${PREFIX}/lib/libspamc.so.0
+ ${LN} -sf libspamc.so.0 ${STAGEDIR}${PREFIX}/lib/libspamc.so
+.if ${PORT_OPTIONS:MSSL}
+ ${INSTALL_LIB} ${WRKSRC}/spamc/libsslspamc.so ${STAGEDIR}${PREFIX}/lib/libsslspamc.so.0
+ ${LN} -sf libsslspamc.so.0 ${STAGEDIR}${PREFIX}/lib/libsslspamc.so
.endif
+ ${INSTALL_DATA} ${WRKSRC}/spamc/libspamc.h ${STAGEDIR}${PREFIX}/include
-pre-su-install:
- @${SH} ${PKGINSTALL} ${PKGNAME} PRE-INSTALL
- @${INSTALL_PROGRAM} ${WRKSRC}/spamc/libspamc.so ${PREFIX}/lib/libspamc.so.0
- @${LN} -sf libspamc.so.0 ${PREFIX}/lib/libspamc.so
-.if !defined(WITHOUT_SSL)
- @${INSTALL_PROGRAM} ${WRKSRC}/spamc/libsslspamc.so ${PREFIX}/lib/libsslspamc.so.0
- @${LN} -sf libsslspamc.so.0 ${PREFIX}/lib/libsslspamc.so
-.endif
- @${INSTALL_DATA} ${WRKSRC}/spamc/libspamc.h ${PREFIX}/include
+post-install::
+ ${STRIP_CMD} ${STAGEDIR}${PREFIX}/bin/spamc
+ @${MKDIR} ${STAGEDIR}/var/lib/spamassassin ${STAGEDIR}${DBDIR}/spamassassin ${STAGEDIR}/var/run/spamd
+ @${MKDIR} ${STAGEDIR}${DOCSDIR}
+ ${INSTALL_DATA} ${DOCS:S|^|${WRKSRC}/|} ${STAGEDIR}${DOCSDIR}
+ (cd ${WRKSRC} && ${COPYTREE_SHARE} "sql ldap" ${STAGEDIR}${DOCSDIR})
-post-install:
-.if defined (WITH_SPAMC)
- @${STRIP_CMD} ${PREFIX}/bin/spamc
-.endif
- @[ -f ${PREFIX}/etc/mail/spamassassin/init.pre ] || \
- ${CP} ${PREFIX}/etc/mail/spamassassin/init.pre.sample \
- ${PREFIX}/etc/mail/spamassassin/init.pre
- @[ -f ${PREFIX}/etc/mail/spamassassin/v310.pre ] || \
- ${CP} ${PREFIX}/etc/mail/spamassassin/v310.pre.sample \
- ${PREFIX}/etc/mail/spamassassin/v310.pre
- @[ -f ${PREFIX}/etc/mail/spamassassin/v312.pre ] || \
- ${CP} ${PREFIX}/etc/mail/spamassassin/v312.pre.sample \
- ${PREFIX}/etc/mail/spamassassin/v312.pre
- @[ -f ${PREFIX}/etc/mail/spamassassin/v320.pre ] || \
- ${CP} ${PREFIX}/etc/mail/spamassassin/v320.pre.sample \
- ${PREFIX}/etc/mail/spamassassin/v320.pre
- @PKG_PREFIX=${PREFIX} BATCH=${BATCH} SU_CMD="${SU_CMD}" ${SH} ${PKGDIR}/pkg-install ${PKGNAME} POST-INSTALL
- @[ -f ${PREFIX}/etc/mail/spamassassin/v330.pre ] || \
- ${CP} ${PREFIX}/etc/mail/spamassassin/v330.pre.sample \
- ${PREFIX}/etc/mail/spamassassin/v330.pre
-
-.if !defined(NOPORTDOCS)
- @${MKDIR} ${DOCSDIR} ${DOCSDIR}/sql ${DOCSDIR}/ldap
- @${INSTALL_DATA} ${DOCS:S|^|${WRKSRC}/|} ${DOCSDIR}
- @${INSTALL_DATA} ${DOCSSQL:S|^|${WRKSRC}/sql/|} ${DOCSDIR}/sql
- @${INSTALL_DATA} ${DOCSLDAP:S|^|${WRKSRC}/ldap/|} ${DOCSDIR}/ldap
-
-.endif
- @${SED} -e 's#PREFIX#${PREFIX}#' ${PKGMESSAGE}
-
.include <bsd.port.post.mk>
Modified: trunk/mail/spamassassin/distinfo
===================================================================
--- trunk/mail/spamassassin/distinfo 2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/distinfo 2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,2 +1,2 @@
-SHA256 (Mail-SpamAssassin-3.3.2.tar.gz) = 5323038939a0ef9fc97d5264defce3ae1d95e98b3a94c4c3b583341c927f32df
-SIZE (Mail-SpamAssassin-3.3.2.tar.gz) = 1208182
+SHA256 (Mail-SpamAssassin-3.4.0.tar.gz) = 244914c30976844878a7f129fd503eb40986c68a3800f416c3a68b14507c0a64
+SIZE (Mail-SpamAssassin-3.4.0.tar.gz) = 1269753
Added: trunk/mail/spamassassin/files/3.4.0-RELEASE-NOTES.txt
===================================================================
--- trunk/mail/spamassassin/files/3.4.0-RELEASE-NOTES.txt (rev 0)
+++ trunk/mail/spamassassin/files/3.4.0-RELEASE-NOTES.txt 2014-09-12 01:45:46 UTC (rev 16990)
@@ -0,0 +1,461 @@
+To: users, dev, announce
+Subject: ANNOUNCE: Apache SpamAssassin 3.4.0 available
+
+Release Notes -- Apache SpamAssassin -- Version 3.4.0
+
+Introduction
+------------
+
+This is a major release. It introduces over two years of bug fixes and
+features since the release of SpamAssassin 3.3.2 on June 16, 2011.
+3.4.0 includes the Bayes Redis (http://redis.io/) back-end (bug 6879),
+EDNS0 changes (bug 6910), native IPv6 support, numerous URIBL.pm changes
+or features and a small API change in libspamc (bug 6562) with many other
+subtle changes.
+
+SpamAssassin was tested on perl 5.18.2, and (out of curiosity) also
+on a Raspberry Pi (ARM6, Raspbian / Debian 7.2 Wheezy, perl 5.14.2)
+... yes, it is 20 times slower compared to i7-960 CPU, but all tests
+pass!
+
+Overall, this release has been tested on many production-level
+environments for nearly a year, including testing on an IPv6-only host.
+It is highly recommended and stable.
+
+NOTE: Complete changes are available at
+http://svn.apache.org/repos/asf/spamassassin/branches/3.4/Changes
+
+
+Notable Sendmail Bug
+--------------------
+
+Sendmail 8.14.5 and below contain a canonicalization misfeature / bug
+that can cause DKIM failures.
+See https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6462.
+
+
+Compatibility with version 3.3.2
+--------------------------------
+
+* DNS queries generated by SpamAssassin now enable option EDNS0 in query
+packets and specify a buffer size of 4096 bytes by default. This allows
+DNS replies larger than 512 bytes to be returned in one UDP datagram,
+avoiding a need for re-issuing a failed query over a TCP protocol. This
+default setting is well suited if a DNS resolver (i.e. a recursive DNS
+server) is located on the same LAN as a host running SpamAssassin, which
+is the usual setup for all but perhaps some home uses of SpamAssassin.
+
+The option should be disabled (by 'dns_options noedns0') when a recursive
+DNS server is only reachable through some old-fashioned firewall or through
+some picky router with deep packet inspection which bans DNS UDP messages
+larger than 512 bytes, or blocks fragmented UDP datagrams.
+
+The 'dns_options' setting is documented in Mail::SpamAssassin::Conf POD
+or man page, more details in bug 6910 and bug 6862.
+
+
+* A default setting for option 'dns_available' was changed from 'test' to
+'yes' (bug 6770, bug 6769), so SpamAssassin now assumes by default that
+it is running on a host with an internet connection and a working DNS
+resolver. If this is not the case, please configure this option explicitly.
+
+The change avoids surprises on an otherwise well connected host which may
+experience a temporary DNS unavailability at the system startup time or a
+temporary network outage when spamd was starting, and the initial failed
+test would disable DNS queries permanently. The option is documented in
+the Mail::SpamAssassin::Conf POD or man page.
+
+
+* When Bayes classification is in use and messages are 'learned' as spam
+or ham and stored in a database, the Bayes plugin generates internal
+message IDs of learned messages and stores them in a 'seen' database to
+avoid re-learning duplicates and accidental un-learning messages that
+were not previously learned. With changes in bug 5185, the calculation
+of message IDs in a bayes 'seen' database has changed, so new code can
+no longer associate new messages with those learned before the change.
+
+Note that this change does not affect recognition of old tokens and the
+classification algorithm, only duplicate detection and unlearning of old
+messages is affected.
+
+Because of this change, if you use Bayes and you are upgrading from a
+version prior to 3.4.0, you may consider wiping your Bayes database
+and starting fresh.
+
+However, this is not mandatory. If you choose to keep your current
+database tokens, these are the ramifications:
+
+1 - If you re-process emails that have already been learned before,
+ it will create duplicate entries because of the new msg_id format.
+ The duplicates will expire, eventually, and should cause minimal
+ impact unless it occurs frequently.
+
+2 - If you try and unlearn or reclassify an email processed prior to the
+ upgrade, the system will be unable to do so because of the new msg_id
+ format. If unlearning a message (that was learned before the change)
+ is important, consider just clearing your Bayes store and starting
+ from scratch.
+
+
+Dependency changes since version 3.3.2
+--------------------------------------
+
+Dependency on the following Perl modules were dropped: Net::Ident,
+IP::Country::Fast and IP::Country.
+
+Dependency on a perl module LWP::UserAgent as used by sa-update is now
+made optional if any of programs curl, wget, or fetch are available.
+
+New optional dependencies on the following Perl modules were introduced:
+
+- new optional dependency on Geo::IP in a RelayCountry plugin (bug 6599);
+ for backward compatibility IP::Country::Fast is used if Geo::IP is
+ not installed
+
+- new optional dependency on IO::Socket::IP for a cleaner IP support
+ regardless of a protocol family (IPv4 and IPv6)
+
+- new optional dependency on Net::Patricia to speed up lookups on
+ internal_networks, trusted_networks or msa_networks when these lists
+ contain a larger number of entries
+
+- new optional dependency on programs curl, wget, or a FreeBSD fetch.
+ sa-update will use any of these external programs to download rule
+ updates, either over IPv6 or over IPv4. Any of these three programs
+ suffices - the installation procedure is currently unclear on this,
+ its warning may be understood as if all three programs are needed,
+ which is not the case
+
+- minimal required version of NetAddr::IP was bumped to 4.010
+
+
+Internal changes potentially affecting third party software
+using Mail::SpamAssassin library
+-----------------------------------------------------------
+
+A caller is now given a choice of calling srand() by itself (e.g. before
+forking) or let a SpamAssassin library do it as before. Avoiding redundant
+initialization of a perl's random number generator can prevent unnecessary
+entropy loss. It is controlled by option skip_prng_reseeding in a call
+to Mail::SpamAssassin::new(). The change was documented in bug 6690.
+
+The Mail::SpamAssassin::parser can now accept a message also as a string
+reference, avoiding one copy in memory. Documented in bug 6686.
+
+A caller may pass the original mail body size to Mail::SpamAssassin::parse
+through the suppl_attrib argument's field 'body_size'. This mail body size
+is accessible to the eval rule check_body_length. It can be useful when a
+caller only passes a truncated message to SpamAssassin. Documented in bug
+6830.
+
+A new plugin callback "prefork_init" was introduced, which should be called
+by a master process (e.g. spamd) before forking multiple child processes.
+For compatibility this call is currently optional, but recommended for new
+versions. Currently only a Redis backend for Bayes checks will benefit from
+being notified before a fork. Documented in bug 6942.
+
+
+Notable bug fixes
+-----------------
+
+The sa-update program now avoids repeatedly downloading same rules if
+subsequent unpacking of rules and updating fails. Documented in bug 6655.
+
+Several incompatibilities with newer versions of a perl module Net::DNS
+as used by sa-update and by the SpamAssassin library were fixed.
+See Net::DNS problem [rt.cpan.org #83451].
+
+A perl module Razor agent clobbers entropy of a random number generator by
+re-initializing the generator on every call. The SpamAssassin Razor plugin
+now provides a workaround, preserving entropy across calls to Razor2 agent.
+
+A workaround in BayesStore/MySQL.pm was added for a MySQL server bug,
+see http://bugs.mysql.com/bug.php?id=46675 .
+
+Documentation was fixed: trailing dots in DNSBL zone names are not required
+since version 3.1.0 of Mail::SpamAssassin (September 2005).
+
+
+Notable features:
+=================
+
+Redis database backend for a Bayes database
+-------------------------------------------
+
+In addition to existing backends, the 3.4.0 introduces support for keeping
+a Bayes database on a Redis server, either running locally, or accessed
+over network. Similar to SQL backends, the database may be concurrently
+used by several hosts running SpamAssassin.
+
+The current implementation only supports a global Bayes database, i.e.
+per-recipient sub-databases are not supported. The Redis 2.6.* server
+supports access over IPv4 or over a Unix socket, starting with version
+2.8.0 also IPv6 is supported. Bear in mind that Redis server only offers
+limited access controls, so it is advisable to let the Redis server bind
+to a loopback interface only, or to use other mechanisms to limit access,
+such as local firewall rules.
+
+The Redis backend for Bayes can put a Lua scripting support in a Redis
+server to good use, improving performance. The Lua support is available
+in Redis server since version 2.6. In absence of a Lua support, the Redis
+backend uses batched (pipelined) traditional Redis commands, so it should
+work with a Redis server version 2.4 (untested), although this is not
+recommended for busy sites.
+
+Expiration of token and 'seen' message id entries is left to the Redis
+server. There is no provision for manually expiring a database, so it is
+highly recommended to leave the setting bayes_auto_expire to its default
+value 1 (i.e. enabled).
+
+Example configuration:
+
+ bayes_store_module Mail::SpamAssassin::BayesStore::Redis
+ bayes_sql_dsn server=127.0.0.1:6379;password=foo;database=2
+ bayes_token_ttl 21d
+ bayes_seen_ttl 8d
+ bayes_auto_expire 1
+
+
+Improved support for IPv6
+-------------------------
+
+The rules-updating program sa-update and its infrastructure is now usable
+over either IPv4 or IPv6, including from an IPv6-only hosts (bug 6654).
+
+SpamAssassin is now usable on an IPv6-only host: affects installation,
+self-tests, rule updates, client, server, and a command-line spamassassin.
+
+Command line options -4 and -6 were added to prefer/choose/force IPv4 or
+IPv6 in programs spamassassin, spamd, spamc, and sa-update.
+
+Command line options --listen and --allowed-ips in spamd can now accept
+IPv6 addresses.
+
+Preferably a perl module IO::Socket::IP is used (if it is available) for
+network communication regardless of a protocol family - for DNS queries,
+by spamd server side, and by a client code in Mail::SpamAssassin::Client.
+As a fallback when the module IO::Socket::IP is unavailable, an older
+module IO::Socket::INET6 is used, or eventually the IO::Socket::INET is
+used as last resort.
+
+If spamd fails to start with an 'Address already in use' message, please
+install perl module IO::Socket::IP, or deintall IO::Socket::INET6, or
+specify a socket bind address explicitly with a spamd --listen option.
+See bug 6953 for details.
+
+The spamd server can now simultaneously listen on multiple sockets,
+possibly in different protocol domains (Unix sockets, INET or INET6
+protocol families.
+
+DnsResolver was updated allowing it to work on an IPv6-only host (bug 6653)
+
+A plugin RelayCountry now uses module Geo::IP and its database of IPv6
+addresses GEOIP_COUNTRY_EDITION_V6 when available.
+
+The following configuration options were extended to accept IPv6 addresses:
+dns_server, trusted_networks, internal_networks, msa_networks, (but not yet
+the whitelist_from_rcvd), and their defaults were adjusted accordingly.
+
+The parser code of Received header fields can now deal with IPv6 addresses
+in a mail header section.
+
+The AutoWhitelist plugin was updated and can now deal with IPv6 addresses.
+
+Installation unit tests were updated to prevent them from failing on an
+IPv6-only host.
+
+
+New command-line options
+------------------------
+
+New command-line option for spamd: added an option --listen (or -i),
+which can be specified multiple times and allows spamd to accept requests
+over multiple INET (IPv4) or INET6 (IPv6) or UNIX sockets. See bug 6841,
+and see also option --port.
+
+New command-line option for spamc: -X (or --unavailable-tempfail) allows
+spamc to return EX_TEMPFAIL instead of EX_UNAVAILABLE when using option -x.
+
+As already noted in the 'Improved support for IPv6' section, options -4
+and -6 were added to programs spamassassin, spamd, spamc, and sa-update.
+
+The sa-update utility can now take multiple -v or --verbose options to
+increase verbosity.
+
+The sa-learn command has a new option --max-size .
+
+
+New configuration options
+-------------------------
+
+Plugin/URIDNSBL: new tflags options 'a' and 'ns' were introduced. They are
+documented in the Mail::SpamAssassin::Plugin::URIDNSBL POD or man page.
+
+Plugin/AutoLearnThreshold: new option autolearn_force was added. It is
+documented in the Mail::SpamAssassin::Plugin::AutoLearnThreshold POD or
+man page.
+
+Plugin/ASN: new options asn_prefix and clear_asn_lookups were added.
+They are documented in Mail::SpamAssassin::Plugin::ASN POD or man page.
+
+
+The following new options, as implemented by various plugins or by
+other modules, are all documented in the Mail::SpamAssassin::Conf POD
+or man page:
+
+- Plugin/WLBLEval: new configuration options were added: enlist_uri_host,
+delist_uri_host, with shorthands blacklist_uri_host and whitelist_uri_host
+and an associated eval rule check_uri_host_listed.
+
+- Configuration options dns_query_restriction (allow|deny) and
+clear_dns_query_restriction were added (bug 6884).
+
+- A 'dns_options' setting accepts new sub-options 'dns0x20' and 'edns'.
+
+- Added option 'dns_server' which specifies an IP address of a recursive
+DNS server (i.e. DNS resolver) and optionally its port number.
+
+- Added options dns_local_ports_permit, dns_local_ports_avoid and
+dns_local_ports_none to control source port local ranges available to
+DNS queries
+
+- Added the following sub-options to the tflags setting: autolearn_force,
+maxhits=N, ips_only, domains_only, a, ns.
+
+- The option whitelist_from_rcvd can now take an IP address as its second
+argument (instead of a domain name), which can be useful for whitelisting
+a sending mailer which has no reverse DNS mapping.
+
+
+
+ArchiveIterator has new options opt_max_size and opt_from_regex. They are
+documented in Mail::SpamAssassin::ArchiveIterator POD or man page.
+
+A new tag (macro) _RULESVERSION_ was added. It expands to a comma-separated
+list of rules versions, retrieved from an '# UPDATE version' comment in
+rules files and can be used in an 'add_header' configuration setting.
+
+
+New plugins
+-----------
+
+A new plugin AskDNS was introduced.
+
+Using a DNS query template as specified in a parameter of an askdns rule,
+the plugin replaces tag names as found in the template with their values
+and launches DNS queries as soon as tag values become available. When DNS
+responses trickle in, filters them according to the requested DNS resource
+record type and an optional subrule filtering expression, yielding a rule
+hit if a response meets filtering conditions.
+
+
+Optimizations
+-------------
+
+Several smaller performance optimizations were introduced, among others:
+bug 6508 (uses Net::Patricia if available), bug 6854 (base64 attachments),
+bug 6915 (get_tag speedup).
+
+The DNS client code module now caches queries and replies for the duration
+of processing one mail message. Duplicate DNS queries by different rules
+which happen to query the same DNS resource are now avoided.
+
+
+
+Downloading and availability
+----------------------------
+
+Downloads are available from:
+
+http://spamassassin.apache.org/downloads.cgi
+
+md5sum of archive files:
+
+46e99adc0affebbe5f3524b4834e0345 Mail-SpamAssassin-3.4.0.tar.bz2
+5d0b50cee3bfa905cca35c33296c8c2a Mail-SpamAssassin-3.4.0.tar.gz
+088a9b9bf7f3d93350f8c8920cbd2fe6 Mail-SpamAssassin-3.4.0.zip
+9c15df55e9ec2a3c8376f3e15e448a2e Mail-SpamAssassin-rules-3.4.0.r1565117.tgz
+
+sha1sum of archive files:
+
+5bc66cd599cbe6a38a127d7813d4abc8af03b667 Mail-SpamAssassin-3.4.0.tar.bz2
+4dac1384282b6201f7d80cea8295933ef08e7e28 Mail-SpamAssassin-3.4.0.tar.gz
+3fa7715fb4c8b558b5fbc2e5a1288a751d8d12e3 Mail-SpamAssassin-3.4.0.zip
+d71a64cab9f5454d3b164e44d3649bff9cb87f87 Mail-SpamAssassin-rules-3.4.0.r1565117.tgz
+
+Note that the *-rules-*.tar.gz files are only necessary if you cannot,
+or do not wish to, run "sa-update" after install to download the latest
+fresh rules.
+
+See the INSTALL and UPGRADE files in the distribution for important
+installation notes.
+
+
+GPG Verification Procedure
+--------------------------
+The release files also have a .asc accompanying them. The file serves
+as an external GPG signature for the given release file. The signing
+key is available via the wwwkeys.pgp.net key server, as well as
+http://www.apache.org/dist/spamassassin/KEYS
+
+The key information is:
+
+pub 4096R/F7D39814 2009-12-02
+ Key fingerprint = D809 9BC7 9E17 D7E4 9BC2 1E31 FDE5 2F40 F7D3 9814
+uid SpamAssassin Project Management Committee <private at spamassassin.apache.org>
+uid SpamAssassin Signing Key (Code Signing Key, replacement for 1024D/265FA05B) <dev at spamassassin.apache.org>
+sub 4096R/7B3265A5 2009-12-02
+
+To verify a release file, download the file with the accompanying .asc file and run the following commands:
+
+ gpg -v --keyserver wwwkeys.pgp.net --recv-key F7D39814
+ gpg --verify Mail-SpamAssassin-3.4.0.tar.bz2.asc
+ gpg --fingerprint F7D39814
+
+Then verify that the key matches the signature.
+
+Note that older versions of gnupg may not be able to complete the steps
+above. Specifically, GnuPG v1.0.6, 1.0.7 & 1.2.6 failed while v1.4.11
+worked flawlessly.
+
+See http://www.apache.org/info/verification.html for more information
+on verifying Apache releases.
+
+
+About Apache SpamAssassin
+-------------------------
+
+Apache SpamAssassin is a mature, widely-deployed open source project
+that serves as a mail filter to identify spam. SpamAssassin uses a
+variety of mechanisms including mail header and text analysis, Bayesian
+filtering, DNS blocklists, and collaborative filtering databases. In
+addition, Apache SpamAssassin has a modular architecture that allows
+other technologies to be quickly incorporated as an addition or as a
+replacement for existing methods.
+
+Apache SpamAssassin typically runs on a server, classifies and labels
+spam before it reaches your mailbox, while allowing other components of
+a mail system to act on its results.
+
+Most of the Apache SpamAssassin is written in Perl, with heavily
+traversed code paths carefully optimized. Benefits are portability,
+robustness and facilitated maintenance. It can run on a wide variety of
+POSIX platforms.
+
+The server and the Perl library feels at home on Unix and Linux
+platforms, and reportedly also works on MS Windows systems under ActivePerl.
+
+For more information, visit http://spamassassin.apache.org/
+
+
+About The Apache Software Foundation
+------------------------------------
+
+Established in 1999, The Apache Software Foundation provides
+organizational, legal, and financial support for more than 100
+freely-available, collaboratively-developed Open Source projects. The
+pragmatic Apache License enables individual and commercial users to
+easily deploy Apache software; the Foundation's intellectual property
+framework limits the legal exposure of its 2,500+ contributors.
+
+For more information, visit http://www.apache.org/
Deleted: trunk/mail/spamassassin/files/manpages
===================================================================
--- trunk/mail/spamassassin/files/manpages 2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/files/manpages 2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,71 +0,0 @@
-# $FreeBSD$
-MAN3+= Mail::SpamAssassin.3 \
- Mail::SpamAssassin::AICache.3 \
- Mail::SpamAssassin::ArchiveIterator.3 \
- Mail::SpamAssassin::AsyncLoop.3 \
- Mail::SpamAssassin::AutoWhitelist.3 \
- Mail::SpamAssassin::Bayes.3 \
- Mail::SpamAssassin::BayesStore.3 \
- Mail::SpamAssassin::BayesStore::BDB.3 \
- Mail::SpamAssassin::BayesStore::MySQL.3 \
- Mail::SpamAssassin::BayesStore::PgSQL.3 \
- Mail::SpamAssassin::BayesStore::SQL.3 \
- Mail::SpamAssassin::Client.3 \
- Mail::SpamAssassin::Conf.3 \
- Mail::SpamAssassin::Conf::LDAP.3 \
- Mail::SpamAssassin::Conf::Parser.3 \
- Mail::SpamAssassin::Conf::SQL.3 \
- Mail::SpamAssassin::DnsResolver.3 \
- Mail::SpamAssassin::Logger.3 \
- Mail::SpamAssassin::Logger::File.3 \
- Mail::SpamAssassin::Logger::Stderr.3 \
- Mail::SpamAssassin::Logger::Syslog.3 \
- Mail::SpamAssassin::Message.3 \
- Mail::SpamAssassin::Message::Metadata.3 \
- Mail::SpamAssassin::Message::Node.3 \
- Mail::SpamAssassin::PerMsgLearner.3 \
- Mail::SpamAssassin::PerMsgStatus.3 \
- Mail::SpamAssassin::PersistentAddrList.3 \
- Mail::SpamAssassin::Plugin.3 \
- Mail::SpamAssassin::Plugin::ASN.3 \
- Mail::SpamAssassin::Plugin::AWL.3 \
- Mail::SpamAssassin::Plugin::AccessDB.3 \
- Mail::SpamAssassin::Plugin::AntiVirus.3 \
- Mail::SpamAssassin::Plugin::AutoLearnThreshold.3 \
- Mail::SpamAssassin::Plugin::Bayes.3 \
- Mail::SpamAssassin::Plugin::BodyRuleBaseExtractor.3 \
- Mail::SpamAssassin::Plugin::Check.3 \
- Mail::SpamAssassin::Plugin::DCC.3 \
- Mail::SpamAssassin::Plugin::DKIM.3 \
- Mail::SpamAssassin::Plugin::Hashcash.3 \
- Mail::SpamAssassin::Plugin::MIMEHeader.3 \
- Mail::SpamAssassin::Plugin::OneLineBodyRuleType.3 \
- Mail::SpamAssassin::Plugin::PhishTag.3 \
- Mail::SpamAssassin::Plugin::Pyzor.3 \
- Mail::SpamAssassin::Plugin::Razor2.3 \
- Mail::SpamAssassin::Plugin::RelayCountry.3 \
- Mail::SpamAssassin::Plugin::ReplaceTags.3 \
- Mail::SpamAssassin::Plugin::Reuse.3 \
- Mail::SpamAssassin::Plugin::Rule2XSBody.3 \
- Mail::SpamAssassin::Plugin::SPF.3 \
- Mail::SpamAssassin::Plugin::Shortcircuit.3 \
- Mail::SpamAssassin::Plugin::SpamCop.3 \
- Mail::SpamAssassin::Plugin::Test.3 \
- Mail::SpamAssassin::Plugin::TextCat.3 \
- Mail::SpamAssassin::Plugin::URIDNSBL.3 \
- Mail::SpamAssassin::Plugin::URIDetail.3 \
- Mail::SpamAssassin::Plugin::VBounce.3 \
- Mail::SpamAssassin::Plugin::WhiteListSubject.3 \
- Mail::SpamAssassin::PluginHandler.3 \
- Mail::SpamAssassin::SQLBasedAddrList.3 \
- Mail::SpamAssassin::SubProcBackChannel.3 \
- Mail::SpamAssassin::Timeout.3 \
- Mail::SpamAssassin::Util.3 \
- Mail::SpamAssassin::Util::DependencyInfo.3 \
- Mail::SpamAssassin::Util::Progress.3 \
- Mail::SpamAssassin::Util::RegistrarBoundaries.3 \
- spamassassin-run.3
-
-MAN1+= spamd.1 spamassassin.1 spamc.1 sa-learn.1 sa-update.1 \
- spamassassin-run.1 sa-compile.1 sa-awl.1
-
Added: trunk/mail/spamassassin/files/patch-UPGRADE
===================================================================
--- trunk/mail/spamassassin/files/patch-UPGRADE (rev 0)
+++ trunk/mail/spamassassin/files/patch-UPGRADE 2014-09-12 01:45:46 UTC (rev 16990)
@@ -0,0 +1,12 @@
+--- UPGRADE.orig 2014/02/11 16:54:00 1567218
++++ UPGRADE 2014/02/11 16:55:08 1567219
+@@ -1,3 +1,9 @@
++Note for Users Upgrading to SpamAssassin 3.4.0
++----------------------------------------------
++- Please see the Announcement file at:
++ http://svn.apache.org/repos/asf/spamassassin/branches/3.4/build/announcements/3.4.0.txt
++ or %%DOCSDIR%%/3.4.0-RELEASE-NOTES.txt
++
+ Note for Users Upgrading to SpamAssassin 3.3.0
+ -----------------------------------------------
+
Deleted: trunk/mail/spamassassin/files/patch-bug6624
===================================================================
--- trunk/mail/spamassassin/files/patch-bug6624 2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/files/patch-bug6624 2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,88 +0,0 @@
---- lib/Mail/SpamAssassin/BayesStore/MySQL.pm (revision 1138970)
-+++ lib/Mail/SpamAssassin/BayesStore/MySQL.pm (working copy)
-@@ -840,14 +840,28 @@
- return 0;
- }
-
-+ # With ON DUPLICATE KEY UPDATE, the affected-rows value per row is 1 if
-+ # the row is inserted as a new row and 2 if an existing row is updated.
-+ #
-+ # Due to a MySQL server bug a value of 3 can be seen.
-+ # See: http://bugs.mysql.com/bug.php?id=46675
-+ # When executing the INSERT ... ON DUPLICATE KEY UPDATE statement
-+ # and checking the rows return count:
-+ # mysql_client_found_rows = 0: The second INSERT returns a row count
-+ # of 2 in all MySQL versions.
-+ # mysql_client_found_rows = 1: The second INSERT returns this row count:
-+ # Before MySQL 5.1.20: 2
-+ # MySQL 5.1.20: undef on Mac OS X, 139775481 on Linux (garbage?)
-+ # MySQL 5.1.21 and up: 3
-+ #
- my $num_rows = $rc;
-
- $sth->finish();
-
-- if ($num_rows == 1 || $num_rows == 2) {
-+ if ($num_rows == 1 || $num_rows == 2 || $num_rows == 3) {
- my $token_count_update = '';
-
-- $token_count_update = "token_count = token_count + 1," if ($num_rows == 1);
-+ $token_count_update = "token_count = token_count + 1," if $num_rows == 1;
- $sql = "UPDATE bayes_vars SET
- $token_count_update
- newest_token_age = GREATEST(newest_token_age, ?),
-@@ -872,7 +886,11 @@
- }
- else {
- # $num_rows was not what we expected
-- dbg("bayes: _put_token: Updated an unexpected number of rows.");
-+ my $token_displ = $token;
-+ $token_displ =~ s/(.)/sprintf('%02x',ord($1))/egs;
-+ dbg("bayes: _put_token: Updated an unexpected number of rows: %s, ".
-+ "id: %s, token (hex): %s",
-+ $num_rows, $self->{_userid}, $token_displ);
- $self->{_dbh}->rollback();
- return 0;
- }
-@@ -987,8 +1005,24 @@
- else {
- my $num_rows = $rc;
-
-- $need_atime_update_p = 1 if ($num_rows == 1 || $num_rows == 2);
-- $new_tokens++ if ($num_rows == 1);
-+ # With ON DUPLICATE KEY UPDATE, the affected-rows value per row is 1 if
-+ # the row is inserted as a new row and 2 if an existing row is updated.
-+ # But see MySQL bug (as above): http://bugs.mysql.com/bug.php?id=46675
-+
-+ if ($num_rows == 1) {
-+ $new_tokens++;
-+ $need_atime_update_p = 1;
-+ } elsif ($num_rows == 2 || $num_rows == 3) {
-+ $need_atime_update_p = 1;
-+ } else {
-+ # $num_rows was not what we expected
-+ my $token_displ = $token;
-+ $token_displ =~ s/(.)/sprintf('%02x',ord($1))/egs;
-+ dbg("bayes: _put_tokens: Updated an unexpected number of rows: %s, ".
-+ "id: %s, token (hex): %s",
-+ $num_rows, $self->{_userid}, $token_displ);
-+ $error_p = 1;
-+ }
- }
- }
-
-@@ -1026,10 +1060,10 @@
- }
- }
- else {
-- # $num_rows was not what we expected
-- dbg("bayes: _put_tokens: Updated an unexpected number of rows.");
-- $self->{_dbh}->rollback();
-- return 0;
-+ info("bayes: _put_tokens: no atime updates needed? Num of tokens: %d",
-+ scalar keys %{$tokens});
-+# $self->{_dbh}->rollback();
-+# return 0;
- }
- }
-
Deleted: trunk/mail/spamassassin/files/patch-bug6655
===================================================================
--- trunk/mail/spamassassin/files/patch-bug6655 2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/files/patch-bug6655 2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,50 +0,0 @@
-$FreeBSD$
-
-https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6655
-
---- lib/Mail/SpamAssassin/Util.pm 2011-06-06 19:59:17.000000000 -0400
-+++ lib/Mail/SpamAssassin/Util.pm 2011-08-26 17:12:19.000000000 -0400
-@@ -1025,6 +1024,8 @@
- return;
- }
-
-+ opendir(my $dh, $tmpdir) || die "Could not open $tmpdir: $!";
-+ closedir $dh;
- my ($reportfile, $tmpfile);
- my $umask = umask 077;
-
-@@ -1052,7 +1053,10 @@
-
- # ensure the file handle is not semi-open in some way
- if ($tmpfile) {
-- close $tmpfile or info("error closing $reportfile: $!");
-+ if (! close $tmpfile) {
-+ info("error closing $reportfile: $!");
-+ $tmpfile=undef;
-+ }
- }
- }
-
---- sa-update.raw 2011-06-24 13:38:50.000000000 -0400
-+++ sa-update.raw 2011-08-29 09:38:50.000000000 -0400
-@@ -677,9 +677,9 @@
-
- # Write the content out to a temp file for GPG/Archive::Tar interaction
- dbg("channel: populating temp content file");
-- open(TMP, ">$content_file") || die "fatal: can't write to content temp file $content_file: $!\n";
-+ open(TMP, ">$content_file") || die "fatal: couldn't create content temp file $content_file: $!\n";
- binmode TMP;
-- print TMP $content;
-+ print TMP $content || die "fatal: can't write to content temp file $content_file: $!\n";
- close(TMP);
-
- # to sign : gpg -bas file
-@@ -695,7 +695,7 @@
- die "fatal: couldn't create temp file for GPG signature: $!\n";
- }
- binmode $tfh;
-- print $tfh $GPG;
-+ print $tfh $GPG || die "fatal: can't write temp file for GPG signature: $!\n";
- close($tfh);
-
- dbg("gpg: calling gpg");
Deleted: trunk/mail/spamassassin/files/patch-bug6698
===================================================================
--- trunk/mail/spamassassin/files/patch-bug6698 2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/files/patch-bug6698 2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,1471 +0,0 @@
---- lib/Mail/SpamAssassin/Plugin/DCC.pm 2011-06-06 19:59:17.000000000 -0400
-+++ lib/Mail/SpamAssassin/Plugin/DCC.pm 2011-11-26 07:22:36.000000000 -0500
-@@ -15,6 +15,20 @@
- # limitations under the License.
- # </@LICENSE>
-
-+# Changes since SpamAssassin 3.3.2:
-+# support for DCC learning. See dcc_learn_score.
-+# deal with orphan dccifd sockets
-+# use `cdcc -q` to not stall waiting to find a DCC server when deciding
-+# whether DCC checks are enabled
-+# use dccproc -Q or dccifd query if a pre-existing X-DCC header shows
-+# the message has already been reported
-+# dccproc now uses -w /var/dcc/whiteclnt so it acts more like dccifd
-+# warn about the use of ancient versions of dccproc and dccifd
-+# turn off dccifd greylisting
-+# query instead of reporting mail messages that contain X-DCC headers and
-+# and so has probably already been reported
-+# try harder to find dccproc and cdcc when not explicitly configured
-+
- =head1 NAME
-
- Mail::SpamAssassin::Plugin::DCC - perform DCC check of messages
-@@ -30,30 +44,31 @@
-
- The DCC or Distributed Checksum Clearinghouse is a system of servers
- collecting and counting checksums of millions of mail messages.
--TheSpamAssassin.pm counts can be used by SpamAssassin to detect and
--reject or filter spam.
--
--Because simplistic checksums of spam can be easily defeated, the main
--DCC checksums are fuzzy and ignore aspects of messages. The fuzzy
--checksums are changed as spam evolves.
-+The counts can be used by SpamAssassin to detect and filter spam.
-
--Note that DCC is disabled by default in C<init.pre> because it is not
--open source. See the DCC license for more details.
-+See http://www.dcc-servers.net/dcc/ for more information about DCC.
-
--See http://www.rhyolite.com/anti-spam/dcc/ for more information about
--DCC.
-+Note that DCC is disabled by default in C<v310.pre> because its use requires
-+software that is not distributed with SpamAssassin and that has license
-+restrictions for certain commercial uses.
-+See the DCC license at http://www.dcc-servers.net/dcc/LICENSE for details.
-+
-+Enable it by uncommenting the "loadplugin Mail::SpamAssassin::Plugin::DCC"
-+confdir/v310.pre or by adding this line to your local.pre. It might also
-+be necessary to install a DCC package, port, rpm, or equivalent from your
-+operating system distributor or a tarball from the primary DCC source
-+at http://www.dcc-servers.net/dcc/#download
-+See also http://www.dcc-servers.net/dcc/INSTALL.html
-
- =head1 TAGS
-
- The following tags are added to the set, available for use in reports,
- header fields, other plugins, etc.:
-
-- _DCCB_ DCC server ID in a response
-- _DCCR_ response from DCC - header field body in X-DCC-*-Metrics
-- _DCCREP_ response from DCC - DCC reputation in percents (0..100)
--
--Tag _DCCREP_ provides a nonempty value only with commercial DCC systems.
--This is the percentage of spam vs. ham sent from the first untrusted relay.
-+ _DCCB_ DCC server ID in X-DCC-*-Metrics header field name
-+ _DCCR_ X-DCC-*-Metrics header field body
-+ _DCCREP_ DCC Reputation or percent bulk mail (0..100) from
-+ commercial DCC software
-
- =cut
-
-@@ -75,8 +90,6 @@
- use vars qw(@ISA);
- @ISA = qw(Mail::SpamAssassin::Plugin);
-
--use vars qw($have_inet6);
--
- sub new {
- my $class = shift;
- my $mailsaobject = shift;
-@@ -87,7 +100,7 @@
-
- # are network tests enabled?
- if ($mailsaobject->{local_tests_only}) {
-- $self->{dcc_disabled} = 1;
-+ $self->{use_dcc} = 0;
- dbg("dcc: local tests only, disabling DCC");
- }
- else {
-@@ -128,20 +141,23 @@
-
- =item dcc_fuz2_max NUMBER
-
--This option sets how often a message's body/fuz1/fuz2 checksum must have been
--reported to the DCC server before SpamAssassin will consider the DCC check as
--matched.
--
--As nearly all DCC clients are auto-reporting these checksums, you should set
--this to a relatively high value, e.g. C<999999> (this is DCC's MANY count).
-+Sets how often a message's body/fuz1/fuz2 checksum must have been reported
-+to the DCC server before SpamAssassin will consider the DCC check hit.
-+C<999999> is DCC's MANY count.
-
- The default is C<999999> for all these options.
-
- =item dcc_rep_percent NUMBER
-
--Only commercial DCC systems provide DCC reputation information. This is the
--percentage of spam vs. ham sent from the first untrusted relay. It will hit
--on new spam from spam sources. Default is C<90>.
-+Only the commercial DCC software provides DCC Reputations. A DCC Reputation
-+is the percentage of bulk mail received from the last untrusted relay in the
-+path taken by a mail message as measured by all commercial DCC installations.
-+See http://www.rhyolite.com/dcc/reputations.html
-+You C<must> whitelist your trusted relays or MX servers with MX or
-+MXDCC lines in /var/dcc/whiteclnt as described in the main DCC man page
-+to avoid seeing your own MX servers as sources of bulk mail.
-+See http://www.dcc-servers.net/dcc/dcc-tree/dcc.html#White-and-Blacklists
-+The default is C<90>.
-
- =cut
-
-@@ -189,13 +205,9 @@
- =item dcc_home STRING
-
- This option tells SpamAssassin where to find the dcc homedir.
--If not given, it will try to get dcc to specify one, and if that fails it
--will try dcc's own default homedir of '/var/dcc'.
--If C<dcc_path> is not specified, it will default to looking in
--C<dcc_home/bin> for dcc client instead of relying on SpamAssassin to find it
--in the current PATH. If it isn't found there, it will look in the current
--PATH. If a C<dccifd> socket is found in C<dcc_home> or specified explicitly,
--it will use that interface instead of C<dccproc>.
-+If not specified, try to use the locally configured directory
-+from the C<cdcc homedir> command.
-+Try /var/dcc if that command fails.
-
- =cut
-
-@@ -205,7 +217,7 @@
- type => $Mail::SpamAssassin::Conf::CONF_TYPE_STRING,
- code => sub {
- my ($self, $key, $value, $line) = @_;
-- if (!defined $value || !length $value) {
-+ if (!defined $value || $value eq '') {
- return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE;
- }
- $value = untaint_file_path($value);
-@@ -223,14 +235,16 @@
-
- =item dcc_dccifd_path STRING
-
--This option tells SpamAssassin where to find the dccifd socket. If
--C<dcc_dccifd_path> is not specified, it will default to looking for a socket
--named C<dccifd> in a directory C<dcc_home>. The C<dcc_dccifd_path> can be
--a Unix socket name (absolute path), or an INET socket specification in a form
--C<[host]:port> or C<host:port>, where a host can be an IPv4 or IPv6 address
--or a host name, and port is a TCP port number. In case of an IPv6 address the
--brackets are required syntax. If a C<dccifd> socket is found, the plugin will
--use it instead of C<dccproc>.
-+This option tells SpamAssassin where to find the dccifd socket instead
-+of a local Unix socket named C<dccifd> in the C<dcc_home> directory.
-+If a socket is specified or found, use it instead of C<dccproc>.
-+
-+If specifed, C<dcc_dccifd_path> is the absolute path of local Unix socket
-+or an INET socket specified as C<[Host]:Port> or C<Host:Port>.
-+Host can be an IPv4 or IPv6 address or a host name
-+Port is a TCP port number. The brackets are required for an IPv6 address.
-+
-+The default is C<undef>.
-
- =cut
-
-@@ -240,45 +254,60 @@
- type => $Mail::SpamAssassin::Conf::CONF_TYPE_STRING,
- code => sub {
- my ($self, $key, $value, $line) = @_;
-- $value = '' if !defined $value;
-- $self->{dcc_dccifd_path_raw} = $value; # for logging purposes
-- undef $self->{dcc_dccifd_host};
-- undef $self->{dcc_dccifd_port};
-- undef $self->{dcc_dccifd_socket};
-- local($1,$2,$3);
-- if ($value eq '') {
-+
-+ if (!defined $value || $value eq '') {
- return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE;
-- } elsif ($value =~ m{^ (?: \[ ([^\]]*) \] | ([^:]*) ) : ([^:]*) \z}sx) {
-- # "[host]:port" or "host:port", where a host can be an IPv4 or IPv6
-- # address or a host name, and port is a TCP port number or service name
-- my $host = defined $1 ? $1 : $2;
-- my $port = $3;
-- $self->{dcc_dccifd_host} = untaint_var($host);
-- $self->{dcc_dccifd_port} = untaint_var($port);
-- dbg("config: dcc_dccifd_path set to [%s]:%s", $host,$port);
-- } else { # assume a unix socket
-+ }
-+
-+ local($1,$2,$3);
-+ if ($value =~ m{^ (?: \[ ([^\]]*) \] | ([^:]*) ) : ([^:]*) \z}sx) {
-+ my $host = untaint_var(defined $1 ? $1 : $2);
-+ my $port = untaint_var($3);
-+ if (!$host) {
-+ info("config: missing or bad host name in dcc_dccifd_path '$value'");
-+ return $Mail::SpamAssassin::Conf::INVALID_VALUE;
-+ }
-+ if (!$port || $port !~ /^\d+\z/ || $port < 1 || $port > 65535) {
-+ info("config: bad TCP port number in dcc_dccifd_path '$value'");
-+ return $Mail::SpamAssassin::Conf::INVALID_VALUE;
-+ }
-+
-+ $self->{dcc_dccifd_host} = $host;
-+ $self->{dcc_dccifd_port} = $port;
-+ if ($host !~ /^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\z/) {
-+ # remember to try IPv6 if we can with a host name or non-IPv4 address
-+ $self->{dcc_dccifd_IPv6} = eval { require IO::Socket::INET6 };
-+ }
-+ dbg("config: dcc_dccifd_path set to [%s]:%s", $host, $port);
-+
-+ } else {
-+ # assume a unix socket
- if ($value !~ m{^/}) {
-- info("config: dcc_dccifd_path should be an absolute socket path");
-+ info("config: dcc_dccifd_path '$value' is not an absolute path");
- # return $Mail::SpamAssassin::Conf::INVALID_VALUE; # abort or accept?
- }
- $value = untaint_file_path($value);
-- # test disabled, dccifd may not yet be running at spamd startup time
-- # if (!-S $value) {
-- # info("config: dcc_dccifd_path '$value' isn't a local socket");
-- # return $Mail::SpamAssassin::Conf::INVALID_VALUE;
-- # }
-+
- $self->{dcc_dccifd_socket} = $value;
- dbg("config: dcc_dccifd_path set to local socket %s", $value);
-+ dbg("dcc: dcc_dccifd_path set to local socket %s", $value);
- }
-+
-+ $self->{dcc_dccifd_path_raw} = $value;
- }
- });
-
- =item dcc_path STRING
-
--This option tells SpamAssassin specifically where to find the C<dccproc>
--client instead of relying on SpamAssassin to find it in the current PATH.
--Note that if I<taint mode> is enabled in the Perl interpreter, you should
--use this, as the current PATH will have been cleared.
-+Where to find the C<dccproc> client program instead of relying on SpamAssassin
-+to find it in the current PATH or C<dcc_home/bin>. This must often be set,
-+because the current PATH is cleared by I<taint mode> in the Perl interpreter,
-+
-+If a C<dccifd> socket is found in C<dcc_home> or specified explicitly
-+with C<dcc_dccifd_path>, use the C<dccifd(8)> interface instead of C<dccproc>.
-+
-+The default is C<undef>.
-+
-
- =cut
-
-@@ -289,12 +318,12 @@
- type => $Mail::SpamAssassin::Conf::CONF_TYPE_STRING,
- code => sub {
- my ($self, $key, $value, $line) = @_;
-- if (!defined $value || !length $value) {
-+ if (!defined $value || $value eq '') {
- return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE;
- }
- $value = untaint_file_path($value);
- if (!-x $value) {
-- info("config: dcc_path '$value' isn't an executable");
-+ info("config: dcc_path '$value' is not executable");
- return $Mail::SpamAssassin::Conf::INVALID_VALUE;
- }
-
-@@ -304,7 +333,7 @@
-
- =item dcc_options options
-
--Specify additional options to the dccproc(8) command. Please note that only
-+Specify additional options to the dccproc(8) command. Only
- characters in the range [0-9A-Za-z ,._/-] are allowed for security reasons.
-
- The default is C<undef>.
-@@ -319,6 +348,7 @@
- code => sub {
- my ($self, $key, $value, $line) = @_;
- if ($value !~ m{^([0-9A-Za-z ,._/-]+)$}) {
-+ info("config: dcc_options '$value' contains impermissible characters");
- return $Mail::SpamAssassin::Conf::INVALID_VALUE;
- }
- $self->{dcc_options} = $1;
-@@ -327,8 +357,9 @@
-
- =item dccifd_options options
-
--Specify additional options to send to the dccifd(8) daemon. Please note that only
--characters in the range [0-9A-Za-z ,._/-] are allowed for security reasons.
-+Specify additional options to send to the dccifd daemon with
-+the ASCII protocol described on the dccifd(8) man page.
-+Only characters in the range [0-9A-Za-z ,._/-] are allowed for security reasons.
-
- The default is C<undef>.
-
-@@ -342,265 +373,306 @@
- code => sub {
- my ($self, $key, $value, $line) = @_;
- if ($value !~ m{^([0-9A-Za-z ,._/-]+)$}) {
-+ info("config: dccifd_options '$value' contains impermissible characters");
- return $Mail::SpamAssassin::Conf::INVALID_VALUE;
- }
- $self->{dccifd_options} = $1;
- }
- });
-
-+=item dcc_learn_score n (default: undef)
-+
-+Report messages with total scores this much larger than the
-+SpamAssassin spam threshold to DCC as spam.
-+
-+=cut
-+
-+ push (@cmds, {
-+ setting => 'dcc_learn_score',
-+ is_admin => 1,
-+ default => undef,
-+ type => $Mail::SpamAssassin::Conf::CONF_TYPE_NUMERIC,
-+ });
-+
- $conf->{parser}->register_commands(\@cmds);
- }
-
-+
-+
-+
-+sub ck_dir {
-+ my ($self, $dir, $tgt, $src) = @_;
-+
-+ $dir = untaint_file_path($dir);
-+ if (!stat($dir)) {
-+ my $dir_errno = 0+$!;
-+ if ($dir_errno == ENOENT) {
-+ dbg("dcc: $tgt $dir from $src does not exist");
-+ } else {
-+ dbg("dcc: $tgt $dir from $src is not accessible: $!");
-+ }
-+ return;
-+ }
-+ if (!-d _) {
-+ dbg("dcc: $tgt $dir from $src is not a directory");
-+ return;
-+ }
-+
-+ $self->{main}->{conf}->{$tgt} = $dir;
-+ dbg("dcc: use '$tgt $dir' from $src");
-+}
-+
- sub find_dcc_home {
- my ($self) = @_;
-+ my $dcc_libexec;
-+
-+ # just once
-+ return if defined $self->{dcc_version};
-+ $self->{dcc_version} = '?';
-
- my $conf = $self->{main}->{conf};
-- return if !$conf->{use_dcc};
-
-- my $dcchome = $conf->{dcc_home} || '';
-
-- # If we're not given the DCC homedir, try getting DCC to tell us it.
-- # If that fails, try the DCC default homedir of '/var/dcc'.
-- if ($dcchome eq '') {
-+ # Get the DCC software version for talking to dccifd and formating the
-+ # dccifd options and the built-in DCC homedir. Use -q to prevent delays.
-+ my $cdcc_home;
-+ my $cdcc = $self->dcc_pgm_path('cdcc');
-+ my $cmd = '-qV homedir libexecdir';
-+ if ($cdcc && open(CDCC, "$cdcc $cmd 2>&1 |")) {
-+ my $cdcc_output = do { local $/ = undef; <CDCC> };
-+ close CDCC;
-
-- my $cdcc = Mail::SpamAssassin::Util::find_executable_in_env_path('cdcc');
-+ $cdcc_output =~ s/\n/ /g; # everything in 1 line for debugging
-+ dbg("dcc: `%s %s` reports '%s'", $cdcc, $cmd, $cdcc_output);
-+ $self->{dcc_version} = ($cdcc_output =~ /^(\d+\.\d+\.\d+)/) ? $1 : '';
-+ $cdcc_home = ($cdcc_output =~ /\s+homedir=(\S+)/) ? $1 : '';
-+ if ($cdcc_output =~ /\s+libexecdir=(\S+)/) {
-+ $self->ck_dir($1, 'dcc_libexec', 'cdcc');
-+ }
-+ }
-
-- my $cdcc_home = '';
-- if ($cdcc && -x $cdcc && open(CDCC, "$cdcc homedir 2>&1|")) {
-- dbg("dcc: dcc_home not set, querying cdcc utility");
-- $cdcc_home = <CDCC> || '';
-- close CDCC;
-+ # without a home, try the homedir from cdcc
-+ if (!$conf->{dcc_home} && $cdcc_home) {
-+ $self->ck_dir($cdcc_home, 'dcc_home', 'cdcc');
-+ }
-+ # finally fall back to /var/dcc
-+ if (!$conf->{dcc_home}) {
-+ $self->ck_dir($conf->{dcc_home} = '/var/dcc', 'dcc_home', 'default')
-+ }
-
-- chomp $cdcc_home;
-- $cdcc_home =~ s/\s+homedir=//;
-- dbg("dcc: cdcc reports homedir as '%s'", $cdcc_home);
-- }
--
-- # try first with whatever the cdcc utility reported
-- my $cdcc_home_errno = 0;
-- if ($cdcc_home eq '') {
-- $cdcc_home_errno = ENOENT;
-- } elsif (!stat($cdcc_home)) {
-- $cdcc_home_errno = 0+$!;
-- }
-- if ($cdcc_home_errno == ENOENT) {
-- # no such file
-- } elsif ($cdcc_home_errno != 0) {
-- dbg("dcc: cdcc reported homedir $cdcc_home is not accessible: $!");
-- } elsif (!-d _) {
-- dbg("dcc: cdcc reported homedir $cdcc_home is not a directory");
-- } else { # ok
-- dbg("dcc: cdcc reported homedir $cdcc_home exists, using it");
-- $dcchome = untaint_var($cdcc_home);
-- }
--
-- # try falling back to /var/dcc
-- if ($dcchome eq '') {
-- my $var_dcc_errno = stat('/var/dcc') ? 0 : 0+$!;
-- if ($var_dcc_errno == ENOENT) {
-- # no such file
-- } elsif ($var_dcc_errno != 0) {
-- dbg("dcc: dcc_home not set and dcc default homedir /var/dcc ".
-- "is not accessible: $!");
-- } elsif (!-d _) {
-- dbg("dcc: dcc_home not set and dcc default homedir /var/dcc ".
-- "is not a directory");
-- } else { # ok
-- dbg("dcc: dcc_home not set but dcc default homedir /var/dcc exists, ".
-- "using it");
-- $dcchome = '/var/dcc';
-+ # fall back to $conf->{dcc_home}/libexec or /var/dcc/libexec for dccsight
-+ if (!$conf->{dcc_libexec}) {
-+ $self->ck_dir($conf->{dcc_home} . '/libexec', 'dcc_libexec', 'dcc_home');
- }
-+ if (!$conf->{dcc_libexec}) {
-+ $self->ck_dir('/var/dcc/libexec', 'dcc_libexec', 'dcc_home');
- }
-
-- if ($dcchome eq '') {
-- dbg("dcc: unable to get homedir from cdcc ".
-- "and the dcc default homedir was not found");
-- }
--
-- # Remember found homedir path
-- dbg("dcc: using '%s' as DCC homedir", $dcchome);
-- $conf->{dcc_home} = $dcchome;
-+ # format options for dccifd
-+ my $opts = ($conf->{dccifd_options} || '') . "\n";
-+ if ($self->{dcc_version} =~ /\d+\.(\d+)\.(\d+)$/ &&
-+ ($1 < 3 || ($1 == 3 && $2 < 123))) {
-+ if ($1 < 3 || ($1 == 3 && $2 < 50)) {
-+ info("dcc: DCC version $self->{dcc_version} is years old, ".
-+ "obsolete, and likely to cause problems. ".
-+ "See http://www.dcc-servers.net/dcc/old-versions.html");
-+ }
-+ $self->{dccifd_lookup_options} = "header " . $opts;
-+ $self->{dccifd_report_options} = "header spam " . $opts;
-+ } else {
-+ # dccifd after version 1.2.123 understands "cksums" and "no-grey"
-+ $self->{dccifd_lookup_options} = "cksums grey-off " . $opts;
-+ $self->{dccifd_report_options} = "header spam grey-off " . $opts;
- }
- }
-
--sub is_dccifd_available {
-- my ($self) = @_;
--
-+sub dcc_pgm_path {
-+ my ($self, $pgm) = @_;
-+ my $pgmpath;
- my $conf = $self->{main}->{conf};
-- $self->{dccifd_available} = 0;
-
-- if (!$conf->{use_dcc}) {
-- dbg("dcc: dccifd is not available: use_dcc is false");
-- } elsif (defined $conf->{dcc_dccifd_host}) {
-- dbg("dcc: dccifd inet socket chosen: [%s]:%s",
-- $conf->{dcc_dccifd_host}, $conf->{dcc_dccifd_port});
-- $self->{dccifd_available} = 1;
-- } else {
-- my $sockpath = $conf->{dcc_dccifd_socket};
-- my $dcchome = $conf->{dcc_home};
-- if (defined $sockpath) {
-- dbg("dcc: dccifd local socket chosen: %s", $sockpath);
-- } elsif (defined $conf->{dcc_dccifd_path_raw}) {
-- # avoid falling back to defaults if explicitly provided but wrong
-- } elsif (defined $dcchome && $dcchome ne '' && -S "$dcchome/dccifd") {
-- $sockpath = "$dcchome/dccifd";
-- $conf->{dcc_dccifd_socket} = $sockpath;
-- dbg("dcc: dccifd default local socket chosen: %s", $sockpath);
-+ $pgmpath = $conf->{dcc_path};
-+ if (defined $pgmpath && $pgmpath ne '') {
-+ # accept explicit setting for dccproc
-+ return $pgmpath if $pgm eq 'dccproc';
-+ # try adapting it for cdcc and everything else
-+ if ($pgmpath =~ s{[^/]+\z}{$pgm}s) {
-+ $pgmpath = untaint_file_path($pgmpath);
-+ if (-x $pgmpath) {
-+ dbg("dcc: dcc_pgm_path, found %s in dcc_path: %s", $pgm,$pgmpath);
-+ return $pgmpath;
- }
-- if (defined $sockpath && -S $sockpath && -w _ && -r _) {
-- $self->{dccifd_available} = 1;
-- } elsif (!defined $conf->{dcc_dccifd_path_raw}) {
-- dbg("dcc: dccifd is not available: no r/w dccifd socket found");
-- } else {
-- dbg("dcc: dccifd is not available: no r/w dccifd socket found: %s",
-- $conf->{dcc_dccifd_path_raw});
- }
- }
-
-- return $self->{dccifd_available};
-+ $pgmpath = Mail::SpamAssassin::Util::find_executable_in_env_path($pgm);
-+ if (defined $pgmpath) {
-+ dbg("dcc: dcc_pgm_path, found %s in env.path: %s", $pgm,$pgmpath);
-+ return $pgmpath;
-+ }
-+
-+ # try dcc_home/bin, dcc_libexec, and some desperate last attempts
-+ foreach my $dir ($conf->{dcc_home}.'/bin', $conf->{dcc_libexec},
-+ '/usr/local/bin', '/usr/local/dcc', '/var/dcc') {
-+ $pgmpath = $dir . '/' . $pgm;
-+ if (-x $pgmpath) {
-+ dbg("dcc: dcc_pgm_path, found %s in %s: %s", $pgm,$dir,$pgmpath);
-+ return $pgmpath;
-+ }
-+ }
-+
-+ return;
- }
-
--sub is_dccproc_available {
-+sub is_dccifd_available {
- my ($self) = @_;
- my $conf = $self->{main}->{conf};
-
-- $self->{dccproc_available} = 0;
-+ # dccifd remains available until it breaks
-+ return $self->{dccifd_available} if $self->{dccifd_available};
-
-- if (!$conf->{use_dcc}) {
-- dbg("dcc: dccproc is not available: use_dcc is false");
-- return 0;
-+ # deal with configured INET socket
-+ if (defined $conf->{dcc_dccifd_host}) {
-+ dbg("dcc: dccifd is available via INET socket [%s]:%s",
-+ $conf->{dcc_dccifd_host}, $conf->{dcc_dccifd_port});
-+ return ($self->{dccifd_available} = 1);
- }
-- my $dcchome = $conf->{dcc_home} || '';
-- my $dccproc = $conf->{dcc_path} || '';
-
-- if ($dccproc eq '' && ($dcchome ne '' && -x "$dcchome/bin/dccproc")) {
-- $dccproc = "$dcchome/bin/dccproc";
-+ # the first time here, compute a default local socket based on DCC home
-+ # from self->find_dcc_home() called elsewhere
-+ my $sockpath = $conf->{dcc_dccifd_socket};
-+ if (!$sockpath) {
-+ if ($conf->{dcc_dccifd_path_raw}) {
-+ $sockpath = $conf->{dcc_dccifd_path_raw};
-+ } else {
-+ $sockpath = "$conf->{dcc_home}/dccifd";
- }
-- if ($dccproc eq '') {
-- $dccproc = Mail::SpamAssassin::Util::find_executable_in_env_path('dccproc');
-+ $conf->{dcc_dccifd_socket} = $sockpath;
- }
-
-- unless (defined $dccproc && $dccproc ne '' && -x $dccproc) {
-- dbg("dcc: dccproc is not available: no dccproc executable found");
-- return 0;
-- }
-+ # check the socket every time because it can appear and disappear
-+ return ($self->{dccifd_available} = 1) if (-S $sockpath && -w _ && -r _);
-
-- # remember any found dccproc
-+ dbg("dcc: dccifd is not available; no r/w socket at %s", $sockpath);
-+ return ($self->{dccifd_available} = 0);
-+}
-+
-+sub is_dccproc_available {
-+ my ($self) = @_;
-+ my $conf = $self->{main}->{conf};
-+
-+ # dccproc remains (un)available so check only once
-+ return $self->{dccproc_available} if defined $self->{dccproc_available};
-+
-+ my $dccproc = $conf->{dcc_path};
-+ if (!defined $dccproc || $dccproc eq '') {
-+ $dccproc = $self->dcc_pgm_path('dccproc');
- $conf->{dcc_path} = $dccproc;
-+ if (!$dccproc || ! -x $dccproc) {
-+ dbg("dcc: dccproc is not available: no dccproc executable found");
-+ return ($self->{dccproc_available} = 0);
-+ }
-+ }
-
-- dbg("dcc: dccproc is available: %s", $conf->{dcc_path});
-- $self->{dccproc_available} = 1;
-- return 1;
-+ dbg("dcc: %s is available", $conf->{dcc_path});
-+ return ($self->{dccproc_available} = 1);
- }
-
- sub dccifd_connect {
-- my($self) = @_;
-+ my($self, $tag) = @_;
- my $conf = $self->{main}->{conf};
- my $sockpath = $conf->{dcc_dccifd_socket};
-- my $host = $conf->{dcc_dccifd_host};
-- my $port = $conf->{dcc_dccifd_port};
- my $sock;
-+
- if (defined $sockpath) {
-- dbg("dcc: connecting to a local socket %s", $sockpath);
-- $sock = IO::Socket::UNIX->new(
-- Type => SOCK_STREAM, Peer => $sockpath);
-- $sock or die "dcc: failed to connect to a socket $sockpath: $!\n";
-- } elsif (defined $host) {
-- my $specified_path = $conf->{dcc_dccifd_path_raw};
-- if ($host eq '') {
-- die "dcc: empty host specification: $specified_path\n";
-- }
-- if (!defined $port || $port !~ /^\d+\z/ || $port < 1 || $port > 65535) {
-- die "dcc: bad TCP port number: $specified_path\n";
-- }
-- my $is_inet4 = $host =~ /^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\z/;
-- if ($is_inet4) { # inet4 socket (IPv4 address)
-- dbg("dcc: connecting to inet4 socket [%s]:%s", $host,$port);
-- $sock = IO::Socket::INET->new(
-- Proto => 'tcp', PeerAddr => $host, PeerPort => $port);
-- } else {
-- if (!defined $have_inet6) {
-- $have_inet6 = eval { require IO::Socket::INET6 };
-- $have_inet6 = 0 if !defined $have_inet6;
-+ $sock = IO::Socket::UNIX->new(Type => SOCK_STREAM, Peer => $sockpath);
-+ if ($sock) {
-+ dbg("$tag connected to local socket %s", $sockpath);
-+ return $sock;
- }
-- if (!$have_inet6) { # fallback to an inet4 socket (IPv4)
-- dbg("dcc: connecting(2) to inet4 socket [%s]:%s", $host,$port);
-- $sock = IO::Socket::INET->new(
-- Proto => 'tcp', PeerAddr => $host, PeerPort => $port);
-- } else { # inet6 socket (IPv6) or a host name
-- dbg("dcc: connecting to inet6 socket [%s]:%s", $host,$port);
-+ $self->{dccifd_available} = 0;
-+ info("$tag failed to connect to local socket $sockpath");
-+ return $sock
-+ }
-+
-+ # must be TCP/IP
-+ my $host = $conf->{dcc_dccifd_host};
-+ my $port = $conf->{dcc_dccifd_port};
-+
-+ if ($conf->{dcc_dccifd_IPv6}) {
-+ # try IPv6 if we can with a host name or non-IPv4 address
-+ dbg("$tag connecting to inet6 socket [%s]:%s", $host,$port);
- $sock = IO::Socket::INET6->new(
- Proto => 'tcp', PeerAddr => $host, PeerPort => $port);
-+ # fall back to IPv4 if that failed
- }
-+ if (!$sock) {
-+ dbg("$tag connecting to inet4 socket [%s]:%s", $host, $port);
-+ $sock = IO::Socket::INET->new(
-+ Proto => 'tcp', PeerAddr => $host, PeerPort => $port);
- }
-- $sock or die "dcc: failed to connect to [$host]:$port : $!\n";
-- } else {
-- die "dcc: dccifd socket not provided: $conf->{dcc_dccifd_path_raw}\n";
-- }
-+
-+ info("failed to connect to [$host]:$port : $!") if !$sock;
- return $sock;
- }
-
-+# check for dccifd every time in case enough uses of dccproc starts dccifd
- sub get_dcc_interface {
- my ($self) = @_;
-+ my $conf = $self->{main}->{conf};
-
-- if ($self->is_dccifd_available()) {
-- $self->{dcc_interface} = "dccifd";
-- $self->{dcc_disabled} = 0;
-- }
-- elsif ($self->is_dccproc_available()) {
-- $self->{dcc_interface} = "dccproc";
-- $self->{dcc_disabled} = 0;
-+ if (!$conf->{use_dcc}) {
-+ $self->{dcc_disabled} = 1;
-+ return;
- }
-- else {
-- dbg("dcc: dccifd and dccproc are not available, disabling DCC");
-- $self->{dcc_interface} = "none";
-+
-+ $self->find_dcc_home();
-+ if (!$self->is_dccifd_available() && !$self->is_dccproc_available()) {
-+ dbg("dcc: dccifd and dccproc are not available");
- $self->{dcc_disabled} = 1;
- }
-+
-+ $self->{dcc_disabled} = 0;
- }
-
- sub dcc_query {
-- my ($self, $permsgstatus, $full) = @_;
-+ my ($self, $permsgstatus, $fulltext) = @_;
-
- $permsgstatus->{dcc_checked} = 1;
-
-+ if (!$self->{main}->{conf}->{use_dcc}) {
-+ dbg("dcc: DCC is not available: use_dcc is 0");
-+ return;
-+ }
-+
- # initialize valid tags
- $permsgstatus->{tag_data}->{DCCB} = "";
- $permsgstatus->{tag_data}->{DCCR} = "";
- $permsgstatus->{tag_data}->{DCCREP} = "";
-
-- # short-circuit if there's already a X-DCC header with value of
-- # "bulk" from an upstream DCC check
-- if ($permsgstatus->get('ALL') =~
-- /^(X-DCC-([^:]{1,80})?-?Metrics:.*bulk.*)$/m) {
-- $permsgstatus->{dcc_response} = $1;
-+ if ($$fulltext eq '') {
-+ dbg("dcc: empty message; skipping dcc check");
- return;
- }
-
-- my $timer = $self->{main}->time_method("check_dcc");
-+ if ($permsgstatus->get('ALL') =~ /^(X-DCC-.*-Metrics:.*)$/m) {
-+ $permsgstatus->{dcc_raw_x_dcc} = $1;
-+ # short-circuit if there is already a X-DCC header with value of
-+ # "bulk" from an upstream DCC check
-+ # require "bulk" because then at least one body checksum will be "many"
-+ # and so we know the X-DCC header is not forged by spammers
-+ return if $permsgstatus->{dcc_raw_x_dcc} =~ / bulk /;
-+ }
-
-- $self->find_dcc_home();
-+ my $timer = $self->{main}->time_method("check_dcc");
-
- $self->get_dcc_interface();
-- my $result;
-- if ($self->{dcc_disabled}) {
-- $result = 0;
-- } elsif ($$full eq '') {
-- dbg("dcc: empty message, skipping dcc check");
-- $result = 0;
-- } elsif ($self->{dccifd_available}) {
-- my $client = $permsgstatus->{relays_external}->[0]->{ip};
-- my $clientname = $permsgstatus->{relays_external}->[0]->{rdns};
-- my $helo = $permsgstatus->{relays_external}->[0]->{helo} || "";
-- if ($client) {
-- $client = $client . "\r" . $clientname if $clientname;
-- } else {
-- $client = "0.0.0.0";
-- }
-- $self->dccifd_lookup($permsgstatus, $full, $client, $clientname, $helo);
-- } else {
-- my $client = $permsgstatus->{relays_external}->[0]->{ip};
-- $self->dccproc_lookup($permsgstatus, $full, $client);
-- }
-+ return if $self->{dcc_disabled};
-+
-+ my $envelope = $permsgstatus->{relays_external}->[0];
-+ ($permsgstatus->{dcc_raw_x_dcc},
-+ $permsgstatus->{dcc_cksums}) = $self->ask_dcc("dcc:", $permsgstatus,
-+ $fulltext, $envelope);
- }
-
- sub check_dcc {
-@@ -609,28 +681,27 @@
-
- $self->dcc_query($permsgstatus, $full) if !$permsgstatus->{dcc_checked};
-
-- my $response = $permsgstatus->{dcc_response};
-- return 0 if !defined $response || $response eq '';
-+ my $x_dcc = $permsgstatus->{dcc_raw_x_dcc};
-+ return 0 if !defined $x_dcc || $x_dcc eq '';
-
-- local($1,$2);
-- if ($response =~ /^X-DCC-(.*)-Metrics: (.*)$/) {
-- $permsgstatus->{tag_data}->{DCCB} = $1;
-- $permsgstatus->{tag_data}->{DCCR} = $2;
-+ if ($x_dcc =~ /^X-DCC-(.*)-Metrics: (.*)$/) {
-+ $permsgstatus->set_tag('DCCB', $1);
-+ $permsgstatus->set_tag('DCCR', $2);
- }
-- $response =~ s/many/999999/ig;
-- $response =~ s/ok\d?/0/ig;
-+ $x_dcc =~ s/many/999999/ig;
-+ $x_dcc =~ s/ok\d?/0/ig;
-
- my %count = (body => 0, fuz1 => 0, fuz2 => 0, rep => 0);
-- if ($response =~ /\bBody=(\d+)/) {
-+ if ($x_dcc =~ /\bBody=(\d+)/) {
- $count{body} = $1+0;
- }
-- if ($response =~ /\bFuz1=(\d+)/) {
-+ if ($x_dcc =~ /\bFuz1=(\d+)/) {
- $count{fuz1} = $1+0;
- }
-- if ($response =~ /\bFuz2=(\d+)/) {
-+ if ($x_dcc =~ /\bFuz2=(\d+)/) {
- $count{fuz2} = $1+0;
- }
-- if ($response =~ /\brep=(\d+)/) {
-+ if ($x_dcc =~ /\brep=(\d+)/) {
- $count{rep} = $1+0;
- }
- if ($count{body} >= $conf->{dcc_body_max} ||
-@@ -651,185 +722,185 @@
- }
-
- sub check_dcc_reputation_range {
-- my ($self, $permsgstatus, $full, $min, $max) = @_;
-- $self->dcc_query($permsgstatus, $full) if !$permsgstatus->{dcc_checked};
-+ my ($self, $permsgstatus, $fulltext, $min, $max) = @_;
-+
-+ # this is called several times per message, so parse the X-DCC header once
-+ my $dcc_rep = $permsgstatus->{dcc_rep};
-+ if (!defined $dcc_rep) {
-+ $self->dcc_query($permsgstatus, $fulltext) if !$permsgstatus->{dcc_checked};
-+ my $x_dcc = $permsgstatus->{dcc_raw_x_dcc};
-+ if (defined $x_dcc && $x_dcc =~ /\brep=(\d+)/) {
-+ $dcc_rep = $1+0;
-+ $permsgstatus->set_tag('DCCREP', $dcc_rep);
-+ } else {
-+ $dcc_rep = -1;
-+ }
-+ $permsgstatus->{dcc_rep} = $dcc_rep;
-+ }
-
-- my $response = $permsgstatus->{dcc_response};
-- return 0 if !defined $response || $response eq '';
-+ # no X-DCC header or no reputation in the X-DCC header, perhaps for lack
-+ # of data in the DCC Reputation server
-+ return 0 if $dcc_rep < 0;
-
-+ # cover the entire range of reputations if not told otherwise
- $min = 0 if !defined $min;
-- $max = 999 if !defined $max;
-+ $max = 100 if !defined $max;
-
-- local $1;
-- my $dcc_rep;
-- $dcc_rep = $1+0 if defined $response && $response =~ /\brep=(\d+)/;
-- if (defined $dcc_rep) {
-- $dcc_rep = int($dcc_rep); # just in case, rule ranges are integer percents
- my $result = $dcc_rep >= $min && $dcc_rep <= $max ? 1 : 0;
- dbg("dcc: dcc_rep %s, min %s, max %s => result=%s",
- $dcc_rep, $min, $max, $result?'YES':'no');
-- $permsgstatus->{tag_data}->{DCCREP} = $dcc_rep;
-- return $dcc_rep >= $min && $dcc_rep <= $max ? 1 : 0;
-+ return $result;
-+}
-+
-+# get the X-DCC header line and save the checksums from dccifd or dccproc
-+sub parse_dcc_response {
-+ my ($self, $resp) = @_;
-+ my ($raw_x_dcc, $cksums);
-+
-+ # The first line is the header we want. It uses SMTP folded whitespace
-+ # if it is long. The folded whitespace is always a single \t.
-+ chomp($raw_x_dcc = shift @$resp);
-+ my $v;
-+ while (($v = shift @$resp) && $v =~ s/^\t(.+)\s*\n/ $1/) {
-+ $raw_x_dcc .= $v;
-+ }
-+
-+ # skip the "reported:" line between the X-DCC header and any checksums
-+ # remove ':' to avoid a bug in versions 1.3.115 - 1.3.122 in dccsight
-+ # with the length of "Message-ID:"
-+ $cksums = '';
-+ while (($v = shift @$resp) && $v =~ s/^([^:]*):/$1/) {
-+ $cksums .= $v;
- }
-- return 0;
-+
-+ return ($raw_x_dcc, $cksums);
- }
-
--sub dccifd_lookup {
-- my ($self, $permsgstatus, $fulltext, $client, $clientname, $helo) = @_;
-+sub ask_dcc {
-+ my ($self, $tag, $permsgstatus, $fulltext, $envelope) = @_;
- my $conf = $self->{main}->{conf};
-- my $response;
-- my $left;
-- my $right;
-- my $timeout = $conf->{dcc_timeout};
-- my $opts = $conf->{dccifd_options};
-- my @opts = !defined $opts ? () : split(' ',$opts);
-+ my ($pgm, $err, $sock, $pid, @resp);
-+ my ($client, $clientname, $helo, $opts);
-
- $permsgstatus->enter_helper_run_mode();
-
-+ my $timeout = $conf->{dcc_timeout};
- my $timer = Mail::SpamAssassin::Timeout->new(
- { secs => $timeout, deadline => $permsgstatus->{master_deadline} });
-- my $err = $timer->run_and_catch(sub {
-
-+ $err = $timer->run_and_catch(sub {
- local $SIG{PIPE} = sub { die "__brokenpipe__ignore__\n" };
-
-- my $sock = $self->dccifd_connect();
-- $sock or die "dcc: failed to connect to a dccifd socket";
--
-- # send the options and other parameters to the daemon
-- $sock->print("header " . join(" ", at opts) . "\n")
-- or die "dcc: failed write"; # options
-- $sock->print($client . "\n") or die "dcc: failed write"; # client
-- $sock->print($helo . "\n") or die "dcc: failed write"; # HELO value
-- $sock->print("\n") or die "dcc: failed write"; # sender
-- $sock->print("unknown\r\n") or die "dcc: failed write"; # recipients
-- $sock->print("\n") or die "dcc: failed write"; # recipients
--
-- $sock->print($$fulltext) or die "dcc: failed write";
--
-- $sock->shutdown(1) or die "dcc: failed socket shutdown: $!";
--
-- $sock->getline() or die "dcc: failed read status";
-- $sock->getline() or die "dcc: failed read multistatus";
-+ # prefer dccifd to dccproc
-+ if ($self->{dccifd_available}) {
-+ $pgm = 'dccifd';
-
-- my @null = $sock->getlines();
-- if (!@null) {
-- # no facility prefix on this
-- die "dcc: failed to read header\n";
-- }
-+ $sock = $self->dccifd_connect($tag);
-+ if (!$sock) {
-+ $self->{dccifd_available} = 0;
-+ die("dccproc not available") if (!$self->is_dccproc_available());
-
-- # the first line will be the header we want to look at
-- chomp($response = shift @null);
-- # but newer versions of DCC fold the header if it's too long...
-- while (my $v = shift @null) {
-- last unless ($v =~ s/^\s+/ /); # if this line wasn't folded, stop
-- chomp $v;
-- $response .= $v;
-+ # fall back on dccproc if the socket is an orphan from
-+ # a killed dccifd daemon or some other obvious (no timeout) problem
-+ dbg("$tag fall back on dccproc");
- }
--
-- dbg("dcc: dccifd got response: %s", $response);
--
-- });
--
-- $permsgstatus->leave_helper_run_mode();
--
-- if ($timer->timed_out()) {
-- dbg("dcc: dccifd check timed out after $timeout secs.");
-- return;
- }
-
-- if ($err) {
-- chomp $err;
-- warn("dcc: dccifd -> check skipped: $err\n");
-- return;
-- }
-+ if ($self->{dccifd_available}) {
-
-- if (!defined $response || $response !~ /^X-DCC/) {
-- dbg("dcc: dccifd check failed - no X-DCC returned: %s", $response);
-- return;
-+ # send the options and other parameters to the daemon
-+ $client = $envelope->{ip};
-+ $clientname = $envelope->{rdns};
-+ if (!defined $client) {
-+ $client = '';
-+ } else {
-+ $client .= ("\r" . $clientname) if defined $clientname;
- }
-+ $helo = $envelope->{helo} || '';
-+ if ($tag ne "dcc:") {
-+ $opts = $self->{dccifd_report_options}
-+ } else {
-+ $opts = $self->{dccifd_lookup_options};
-+ # only query if there is an X-DCC header
-+ $opts =~ s/grey-off/& query/ if defined $permsgstatus->{dcc_raw_x_dcc};
-+ }
-+ $sock->print($opts) or die "failed write options\n";
-+ $sock->print($client . "\n") or die "failed write SMTP client\n";
-+ $sock->print($helo . "\n") or die "failed write HELO value\n";
-+ $sock->print("\n") or die "failed write sender\n";
-+ $sock->print("unknown\n\n") or die "failed write 1 recipient\n";
-+ $sock->print($$fulltext) or die "failed write mail message\n";
-+ $sock->shutdown(1) or die "failed socket shutdown: $!";
-
-- $response =~ s/[ \t]\z//; # strip trailing whitespace
-- $permsgstatus->{dcc_response} = $response;
--}
-+ $sock->getline() or die "failed read status\n";
-+ $sock->getline() or die "failed read multistatus\n";
-
--sub dccproc_lookup {
-- my ($self, $permsgstatus, $fulltext, $client) = @_;
-- my $conf = $self->{main}->{conf};
-- my $response;
-- my %count = (body => 0, fuz1 => 0, fuz2 => 0, rep => 0);
-- my $timeout = $conf->{dcc_timeout};
-+ @resp = $sock->getlines();
-+ die "failed to read dccifd response\n" if !@resp;
-
-- $permsgstatus->enter_helper_run_mode();
--
-- # use a temp file here -- open2() is unreliable, buffering-wise, under spamd
-+ } else {
-+ $pgm = 'dccproc';
-+ # use a temp file -- open2() is unreliable, buffering-wise, under spamd
-+ # first ensure that we do not hit a stray file from some other filter.
-+ $permsgstatus->delete_fulltext_tmpfile();
- my $tmpf = $permsgstatus->create_fulltext_tmpfile($fulltext);
-- my $pid;
--
-- my $timer = Mail::SpamAssassin::Timeout->new(
-- { secs => $timeout, deadline => $permsgstatus->{master_deadline} });
-- my $err = $timer->run_and_catch(sub {
--
-- local $SIG{PIPE} = sub { die "__brokenpipe__ignore__\n" };
-
-- # note: not really tainted, this came from system configuration file
-- my $path = untaint_file_path($conf->{dcc_path});
--
-- my $opts = $conf->{dcc_options};
-+ my $path = $conf->{dcc_path};
-+ $opts = $conf->{dcc_options};
- my @opts = !defined $opts ? () : split(' ',$opts);
- untaint_var(\@opts);
-+ unshift(@opts, '-w', 'whiteclnt');
-+ $client = $envelope->{ip};
-+ if ($client) {
-+ unshift(@opts, '-a', untaint_var($client));
-+ } else {
-+ # get external relay IP address from Received: header if not available
-+ unshift(@opts, '-R');
-+ }
-+ if ($tag eq "dcc:") {
-+ # query instead of report if there is an X-DCC header from upstream
-+ unshift(@opts, '-Q') if defined $permsgstatus->{dcc_raw_x_dcc};
-+ } else {
-+ # learn or report spam
-+ unshift(@opts, '-t', 'many');
-+ }
-
-- unshift(@opts, "-a",
-- untaint_var($client)) if defined $client && $client ne '';
--
-- dbg("dcc: opening pipe: %s",
-- join(' ', $path, "-H", "-x", "0", @opts, "< $tmpf"));
-+ dbg("$tag opening pipe to %s",
-+ join(' ', $path, "-C", "-x", "0", @opts, "<$tmpf"));
-
- $pid = Mail::SpamAssassin::Util::helper_app_pipe_open(*DCC,
-- $tmpf, 1, $path, "-H", "-x", "0", @opts);
-+ $tmpf, 1, $path, "-C", "-x", "0", @opts);
- $pid or die "$!\n";
-
- # read+split avoids a Perl I/O bug (Bug 5985)
- my($inbuf,$nread,$resp); $resp = '';
- while ( $nread=read(DCC,$inbuf,8192) ) { $resp .= $inbuf }
- defined $nread or die "error reading from pipe: $!";
-- my @null = split(/^/m, $resp, -1); undef $resp;
-+ @resp = split(/^/m, $resp, -1); undef $resp;
-
- my $errno = 0; close DCC or $errno = $!;
- proc_status_ok($?,$errno)
-- or info("dcc: [%s] finished: %s", $pid, exit_status_str($?,$errno));
--
-- if (!@null) {
-- # no facility prefix on this
-- die "failed to read header\n";
-- }
-+ or info("$tag [%s] finished: %s", $pid, exit_status_str($?,$errno));
-
-- # the first line will be the header we want to look at
-- chomp($response = shift @null);
-- # but newer versions of DCC fold the header if it's too long...
-- while (my $v = shift @null) {
-- last unless ($v =~ s/^\s+/ /); # if this line wasn't folded, stop
-- chomp $v;
-- $response .= $v;
-+ die "failed to read X-DCC header from dccproc\n" if !@resp;
- }
--
-- unless (defined($response)) {
-- # no facility prefix on this
-- die "no response\n"; # yes, this is possible
-- }
--
-- dbg("dcc: got response: %s", $response);
--
- });
-
-+ if ($pgm eq 'dccproc') {
- if (defined(fileno(*DCC))) { # still open
- if ($pid) {
-- if (kill('TERM',$pid)) { dbg("dcc: killed stale helper [$pid]") }
-- else { dbg("dcc: killing helper application [$pid] failed: $!") }
-+ if (kill('TERM',$pid)) {
-+ dbg("$tag killed stale dccproc process [$pid]")
-+ } else {
-+ dbg("$tag killing dccproc process [$pid] failed: $!")
-+ }
- }
- my $errno = 0; close(DCC) or $errno = $!;
-- proc_status_ok($?,$errno)
-- or info("dcc: [%s] terminated: %s", $pid, exit_status_str($?,$errno));
-+ proc_status_ok($?,$errno) or info("$tag [%s] dccproc terminated: %s",
-+ $pid, exit_status_str($?,$errno));
-+ }
- }
-+
- $permsgstatus->leave_helper_run_mode();
-
- if ($timer->timed_out()) {
-@@ -833,204 +904,182 @@
- $permsgstatus->leave_helper_run_mode();
-
- if ($timer->timed_out()) {
-- dbg("dcc: check timed out after $timeout seconds");
-- return;
-+ dbg("$tag $pgm timed out after $timeout seconds");
-+ return (undef, undef);
- }
-
- if ($err) {
- chomp $err;
-- if ($err eq "__brokenpipe__ignore__") {
-- dbg("dcc: check failed: broken pipe");
-- } elsif ($err eq "no response") {
-- dbg("dcc: check failed: no response");
-- } else {
-- warn("dcc: check failed: $err\n");
-- }
-- return;
-+ info("$tag $pgm failed: $err\n");
-+ return (undef, undef);
- }
-
-- if (!defined($response) || $response !~ /^X-DCC/) {
-- $response ||= '';
-- dbg("dcc: check failed: no X-DCC returned (did you create a map file?): %s", $response);
-- return;
-+ my ($raw_x_dcc, $cksums) = $self->parse_dcc_response(\@resp);
-+ if (!defined $raw_x_dcc || $raw_x_dcc !~ /^X-DCC/) {
-+ info("$tag instead of X-DCC header, $pgm returned '%s'", $raw_x_dcc);
-+ return (undef, undef);
- }
--
-- $permsgstatus->{dcc_response} = $response;
-+ dbg("$tag %s responded with '%s'", $pgm, $raw_x_dcc);
-+ return ($raw_x_dcc, $cksums);
- }
-
--# only supports dccproc right now
--sub plugin_report {
-+# tell DCC server that the message is spam according to SpamAssassin
-+sub check_post_learn {
- my ($self, $options) = @_;
-
-- return if $options->{report}->{options}->{dont_report_to_dcc};
-- $self->get_dcc_interface();
-- return if $self->{dcc_disabled};
--
-- # get the metadata from the message so we can pass the external relay information
-- $options->{msg}->extract_message_metadata($options->{report}->{main});
-- my $client = $options->{msg}->{metadata}->{relays_external}->[0]->{ip};
-- if ($self->{dccifd_available}) {
-- my $clientname = $options->{msg}->{metadata}->{relays_external}->[0]->{rdns};
-- my $helo = $options->{msg}->{metadata}->{relays_external}->[0]->{helo} || "";
-- if ($client) {
-- if ($clientname) {
-- $client = $client . "\r" . $clientname;
-- }
-- } else {
-- $client = "0.0.0.0";
-- }
-- if ($self->dccifd_report($options, $options->{text}, $client, $helo)) {
-- $options->{report}->{report_available} = 1;
-- info("reporter: spam reported to DCC");
-- $options->{report}->{report_return} = 1;
-+ # learn only if allowed
-+ return if $self->{learn_disabled};
-+ my $conf = $self->{main}->{conf};
-+ if (!$conf->{use_dcc}) {
-+ $self->{learn_disabled} = 1;
-+ return;
- }
-- else {
-- info("reporter: could not report spam to DCC via dccifd");
-+ my $learn_score = $conf->{dcc_learn_score};
-+ if (!defined $learn_score || $learn_score eq '') {
-+ dbg("dcc: DCC learning not enabled by dcc_learn_score");
-+ $self->{learn_disabled} = 1;
-+ return;
- }
-- } else {
-- # use temporary file: open2() is unreliable due to buffering under spamd
-- my $tmpf = $options->{report}->create_fulltext_tmpfile($options->{text});
-
-- if ($self->dcc_report($options, $tmpf, $client)) {
-- $options->{report}->{report_available} = 1;
-- info("reporter: spam reported to DCC");
-- $options->{report}->{report_return} = 1;
-+ # and if SpamAssassin concluded that the message is spam
-+ # worse than our threshold
-+ my $permsgstatus = $options->{permsgstatus};
-+ if ($permsgstatus->is_spam()) {
-+ my $score = $permsgstatus->get_score();
-+ my $required_score = $permsgstatus->get_required_score();
-+ if ($score < $required_score + $learn_score) {
-+ dbg("dcc: score=%d required_score=%d dcc_learn_score=%d",
-+ $score, $required_score, $learn_score);
-+ return;
- }
-- else {
-- info("reporter: could not report spam to DCC via dccproc");
- }
-- $options->{report}->delete_fulltext_tmpfile();
-+
-+ # and if we checked the message
-+ return if (!defined $permsgstatus->{dcc_raw_x_dcc});
-+
-+ # and if the DCC server thinks it was not spam
-+ if ($permsgstatus->{dcc_raw_x_dcc} !~ /\b(Body|Fuz1|Fuz2)=\d/) {
-+ dbg("dcc: already known as spam; no need to learn");
-+ return;
- }
-+
-+ # dccsight is faster than dccifd or dccproc if we have checksums,
-+ # which we do not have with dccifd before 1.3.123
-+ my $old_cksums = $permsgstatus->{dcc_cksums};
-+ return if ($old_cksums && $self->dccsight_learn($permsgstatus, $old_cksums));
-+
-+ # Fall back on dccifd or dccproc without saved checksums or dccsight.
-+ # get_dcc_interface() was called when the message was checked
-+
-+ # is getting the full text this way kosher? Is get_pristine() public?
-+ my $fulltext = $permsgstatus->{msg}->get_pristine();
-+ my $envelope = $permsgstatus->{relays_external}->[0];
-+ my ($raw_x_dcc, $cksums) = $self->ask_dcc("dcc: learn:", $permsgstatus,
-+ \$fulltext, $envelope);
-+ dbg("dcc: learned as spam") if defined $raw_x_dcc;
- }
-
--sub dccifd_report {
-- my ($self, $options, $fulltext, $client, $helo) = @_;
-- my $conf = $self->{main}->{conf};
-- my $timeout = $conf->{dcc_timeout};
-- # instead of header use whatever the report option is
-- my $opts = $conf->{dccifd_options};
-- my @opts = !defined $opts ? () : split(' ',$opts);
-+sub dccsight_learn {
-+ my ($self, $permsgstatus, $old_cksums) = @_;
-+ my ($raw_x_dcc, $new_cksums);
-+
-+ return 0 if !$old_cksums;
-+
-+ my $dccsight = $self->dcc_pgm_path('dccsight');
-+ if (!$dccsight) {
-+ info("dcc: cannot find dccsight") if $dccsight eq '';
-+ return 0;
-+ }
-
-- $options->{report}->enter_helper_run_mode();
-- my $timer = Mail::SpamAssassin::Timeout->new({ secs => $timeout });
-+ $permsgstatus->enter_helper_run_mode();
-
-- my $err = $timer->run_and_catch(sub {
-+ # use a temp file here -- open2() is unreliable, buffering-wise, under spamd
-+ # ensure that we do not hit a stray file from some other filter.
-+ $permsgstatus->delete_fulltext_tmpfile();
-+ my $tmpf = $permsgstatus->create_fulltext_tmpfile(\$old_cksums);
-+ my $pid;
-
-+ my $timeout = $self->{main}->{conf}->{dcc_timeout};
-+ my $timer = Mail::SpamAssassin::Timeout->new(
-+ { secs => $timeout, deadline => $permsgstatus->{master_deadline} });
-+ my $err = $timer->run_and_catch(sub {
- local $SIG{PIPE} = sub { die "__brokenpipe__ignore__\n" };
-
-- my $sock = $self->dccifd_connect();
-- $sock or die "report: failed to connect to a dccifd socket";
-+ dbg("dcc: opening pipe to %s",
-+ join(' ', $dccsight, "-t", "many", "<$tmpf"));
-
-- # send the options and other parameters to the daemon
-- $sock->print("spam " . join(" ", at opts) . "\n")
-- or die "report: dccifd failed write"; # options
-- $sock->print($client . "\n")
-- or die "report: dccifd failed write"; # client
-- $sock->print($helo . "\n")
-- or die "report: dccifd failed write"; # HELO value
-- $sock->print("\n")
-- or die "report: dccifd failed write"; # sender
-- $sock->print("unknown\r\n")
-- or die "report: dccifd failed write"; # recipients
-- $sock->print("\n")
-- or die "report: dccifd failed write"; # recipients
-+ $pid = Mail::SpamAssassin::Util::helper_app_pipe_open(*DCC,
-+ $tmpf, 1, $dccsight, "-t", "many");
-+ $pid or die "$!\n";
-
-- $sock->print($$fulltext) or die "report: dccifd failed write";
-+ # read+split avoids a Perl I/O bug (Bug 5985)
-+ my($inbuf,$nread,$resp); $resp = '';
-+ while ( $nread=read(DCC,$inbuf,8192) ) { $resp .= $inbuf }
-+ defined $nread or die "error reading from pipe: $!";
-+ my @resp = split(/^/m, $resp, -1); undef $resp;
-
-- $sock->shutdown(1) or die "report: dccifd failed socket shutdown: $!";
-+ my $errno = 0; close DCC or $errno = $!;
-+ proc_status_ok($?,$errno)
-+ or info("dcc: [%s] finished: %s", $pid, exit_status_str($?,$errno));
-
-- $sock->getline() or die "report: dccifd failed read status";
-- $sock->getline() or die "report: dccifd failed read multistatus";
-+ die "dcc: failed to read learning response\n" if !@resp;
-
-- my @ignored = $sock->getlines();
-+ ($raw_x_dcc, $new_cksums) = $self->parse_dcc_response(\@resp);
- });
-
-- $options->{report}->leave_helper_run_mode();
-+ if (defined(fileno(*DCC))) { # still open
-+ if ($pid) {
-+ if (kill('TERM',$pid)) {
-+ dbg("dcc: killed stale dccsight process [$pid]")
-+ } else {
-+ dbg("dcc: killing stale dccsight process [$pid] failed: $!") }
-+ }
-+ my $errno = 0; close(DCC) or $errno = $!;
-+ proc_status_ok($?,$errno) or info("dcc: dccsight [%s] terminated: %s",
-+ $pid, exit_status_str($?,$errno));
-+ }
-+ $permsgstatus->delete_fulltext_tmpfile();
-+ $permsgstatus->leave_helper_run_mode();
-
- if ($timer->timed_out()) {
-- dbg("reporter: DCC report via dccifd timed out after $timeout secs.");
-+ dbg("dcc: dccsight timed out after $timeout seconds");
- return 0;
- }
-
- if ($err) {
- chomp $err;
-- if ($err eq "__brokenpipe__ignore__") {
-- dbg("reporter: DCC report via dccifd failed: broken pipe");
-- } else {
-- warn("reporter: DCC report via dccifd failed: $err\n");
-- }
-+ info("dcc: dccsight failed: $err\n");
- return 0;
- }
-
-+ if ($raw_x_dcc) {
-+ dbg("dcc: learned response: %s", $raw_x_dcc);
- return 1;
--}
--
--sub dcc_report {
-- my ($self, $options, $tmpf, $client) = @_;
-- my $conf = $self->{main}->{conf};
-- my $timeout = $options->{report}->{conf}->{dcc_timeout};
--
-- # note: not really tainted, this came from system configuration file
-- my $path = untaint_file_path($options->{report}->{conf}->{dcc_path});
-- my $opts = $conf->{dcc_options};
-- my @opts = !defined $opts ? () : split(' ',$opts);
-- untaint_var(\@opts);
--
-- # get the metadata from the message so we can pass the external relay info
--
-- unshift(@opts, "-a",
-- untaint_var($client)) if defined $client && $client ne '';
--
-- my $timer = Mail::SpamAssassin::Timeout->new({ secs => $timeout });
--
-- $options->{report}->enter_helper_run_mode();
-- my $err = $timer->run_and_catch(sub {
--
-- local $SIG{PIPE} = sub { die "__brokenpipe__ignore__\n" };
--
-- dbg("report: opening pipe: %s",
-- join(' ', $path, "-H", "-t", "many", "-x", "0", @opts, "< $tmpf"));
--
-- my $pid = Mail::SpamAssassin::Util::helper_app_pipe_open(*DCC,
-- $tmpf, 1, $path, "-H", "-t", "many", "-x", "0", @opts);
-- $pid or die "$!\n";
-+ }
-
-- my($inbuf,$nread,$nread_all); $nread_all = 0;
-- # response is ignored, just check its existence
-- while ( $nread=read(DCC,$inbuf,8192) ) { $nread_all += $nread }
-- defined $nread or die "error reading from pipe: $!";
-+ return 0;
-+}
-
-- dbg("dcc: empty response") if $nread_all < 1;
-+sub plugin_report {
-+ my ($self, $options) = @_;
-
-- my $errno = 0; close DCC or $errno = $!;
-- # closing a pipe also waits for the process executing on the pipe to
-- # complete, no need to explicitly call waitpid
-- # my $child_stat = waitpid($pid,0) > 0 ? $? : undef;
-- proc_status_ok($?,$errno)
-- or die "dcc: reporter error: ".exit_status_str($?,$errno)."\n";
-- });
-- $options->{report}->leave_helper_run_mode();
-+ return if $options->{report}->{options}->{dont_report_to_dcc};
-+ $self->get_dcc_interface();
-+ return if $self->{dcc_disabled};
-
-- if ($timer->timed_out()) {
-- dbg("reporter: DCC report via dccproc timed out after $timeout seconds");
-- return 0;
-- }
-+ # get the metadata from the message so we can report the external relay
-+ $options->{msg}->extract_message_metadata($options->{report}->{main});
-+ my $envelope = $options->{msg}->{metadata}->{relays_external}->[0];
-+ my ($raw_x_dcc, $cksums) = $self->ask_dcc("reporter:", $options->{report},
-+ $options->{text}, $envelope);
-
-- if ($err) {
-- chomp $err;
-- if ($err eq "__brokenpipe__ignore__") {
-- dbg("reporter: DCC report via dccproc failed: broken pipe");
-+ if (defined $raw_x_dcc) {
-+ $options->{report}->{report_available} = 1;
-+ info("reporter: spam reported to DCC");
-+ $options->{report}->{report_return} = 1;
- } else {
-- warn("reporter: DCC report via dccproc failed: $err\n");
-+ info("reporter: could not report spam to DCC");
- }
-- return 0;
-- }
--
-- return 1;
- }
-
- 1;
--
--=back
--
--=cut
Added: trunk/mail/spamassassin/files/patch-bug7018
===================================================================
--- trunk/mail/spamassassin/files/patch-bug7018 (rev 0)
+++ trunk/mail/spamassassin/files/patch-bug7018 2014-09-12 01:45:46 UTC (rev 16990)
@@ -0,0 +1,11 @@
+--- lib/Mail/SpamAssassin/Plugin/Razor2.pm.orig 2014/02/27 00:44:06 1572368
++++ lib/Mail/SpamAssassin/Plugin/Razor2.pm 2014/02/27 00:50:42 1572369
+@@ -115,7 +115,7 @@
+ setting => 'razor_timeout',
+ is_admin => 1,
+ default => 5,
+- type => $Mail::SpamAssassin::Conf::CONF_TYPE_DURATIION,
++ type => $Mail::SpamAssassin::Conf::CONF_TYPE_DURATION,
+ });
+
+ =item razor_config filename
Added: trunk/mail/spamassassin/files/patch-bug7057
===================================================================
--- trunk/mail/spamassassin/files/patch-bug7057 (rev 0)
+++ trunk/mail/spamassassin/files/patch-bug7057 2014-09-12 01:45:46 UTC (rev 16990)
@@ -0,0 +1,15 @@
+--- lib/Mail/SpamAssassin/DnsResolver.pm.orig 2014/06/18 16:47:04 1603517
++++ lib/Mail/SpamAssassin/DnsResolver.pm 2014/06/18 16:48:04 1603518
+@@ -204,8 +204,10 @@
+ @ns_addr_port = @{$self->{conf}->{dns_servers}};
+ dbg("dns: servers set by config to: %s", join(', ', at ns_addr_port));
+ } elsif ($res) { # default as provided by Net::DNS, e.g. /etc/resolv.conf
+- @ns_addr_port = map(untaint_var("[$_]:" . $res->{port}),
+- @{$res->{nameservers}});
++ my @ns = $res->UNIVERSAL::can('nameservers') ? $res->nameservers
++ : @{$res->{nameservers}};
++ my $port = $res->UNIVERSAL::can('port') ? $res->port : $res->{port};
++ @ns_addr_port = map(untaint_var("[$_]:" . $port), @ns);
+ dbg("dns: servers obtained from Net::DNS : %s", join(', ', at ns_addr_port));
+ }
+ return @ns_addr_port;
Added: trunk/mail/spamassassin/files/patch-bug7065
===================================================================
--- trunk/mail/spamassassin/files/patch-bug7065 (rev 0)
+++ trunk/mail/spamassassin/files/patch-bug7065 2014-09-12 01:45:46 UTC (rev 16990)
@@ -0,0 +1,11 @@
+--- lib/Mail/SpamAssassin/BayesStore/DBM.pm.orig 2014-07-06 08:33:29.000000000 -0400
++++ lib/Mail/SpamAssassin/BayesStore/DBM.pm 2014-07-06 08:35:04.000000000 -0400
+@@ -812,7 +812,7 @@
+ return 0 if ($conf->{bayes_journal_max_size} == 0);
+
+ my @vars = $self->get_storage_variables();
+- dbg("bayes: DB journal sync: last sync: ".$vars[7],'bayes','-1');
++ dbg("bayes: DB journal sync: last sync: %s", $vars[7]);
+
+ ## Ok, should we do a sync?
+
Deleted: trunk/mail/spamassassin/files/pkg-install.in
===================================================================
--- trunk/mail/spamassassin/files/pkg-install.in 2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/files/pkg-install.in 2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,77 +0,0 @@
-#!/bin/sh
-#
-# $FreeBSD$
-#
-
-USER=%%USER%%
-GROUP=%%GROUP%%
-INSTALL="%%INSTALL%%"
-PREFIX=%%PREFIX%%
-
-if [ "$2" = "PRE-INSTALL" ];then exit; fi
-
-if [ -z "${INSTALL}" ];then
-echo "report this problem to scheidell at freebsd.org, $*"
-exit 1
-fi
-
-if [ "$2" = "POST-INSTALL" ];then
-ask() {
- local question default answer
-
- question=$1
- default=$2
- if [ -z "${PACKAGE_BUILDING}" -a -z "${BATCH}" ]; then
- read -t120 -p "${question} [${default}]? " answer
- fi
- echo ${answer:-${default}}
-}
-
-yesno() {
- local question default answer
-
- question=$1
- default=$2
- while :; do
- answer=$(ask "${question}" "${default}")
- case "${answer}" in
- [Yy]*) return 0;;
- [Nn]*) return 1;;
- esac
- echo "Please answer yes or no."
- done
-}
-
- # Create pid directory
-
- ${INSTALL} -d -o ${USER} -g ${GROUP} /var/run/spamd
- ${PREFIX}/bin/spamassassin -x -L --lint
- if [ ${?} -ne 0 ];then
- echo "
-*******************************************************
-* _ _ _ _______ ______ __ _ _____ __ _ ______ *
-* | | | |_____| |_____/ | \ | | | \ | | ____ *
-* |__|__| | | | \_ | \_| __|__ | \_| |_____| *
-* *
-*******************************************************
-* You must install rules before starting spamd! *
-*******************************************************"
- if [ -z "${PACKAGE_BUILDING}" -a -z "${BATCH}" ]; then
- if yesno "Do you wish to run sa-update to fetch new rules" "N";then
- ${PREFIX}/bin/sa-update || true
- else
- echo ""
- fi
- ${PREFIX}/bin/spamassassin -x -L --lint
- if [ ${?} -eq 0 ] && grep '^load.*Rule2XSBody' ${PREFIX}/etc/mail/spamassassin/v320.pre > /dev/null ;then
- if yesno "Do you wish to compile rules with re2c (will take a long time)" "N";then
- ${PREFIX}/bin/sa-compile || true
- fi
- fi
- fi
- fi
-
- exit 0
-fi # post-install
-
-exit 0
Added: trunk/mail/spamassassin/files/pkg-message.in
===================================================================
--- trunk/mail/spamassassin/files/pkg-message.in (rev 0)
+++ trunk/mail/spamassassin/files/pkg-message.in 2014-09-12 01:45:46 UTC (rev 16990)
@@ -0,0 +1,22 @@
+You should complete the following post-installation tasks:
+
+ 1) Read %%DOCSDIR%%/INSTALL
+ and %%DOCSDIR%%/UPGRADE
+ BEFORE enabling SpamAssassin for important changes
+
+ 2) Edit the configuration in %%ETCDIR%%,
+ in particular %%ETCDIR%%/init.pre
+ You may get lots of annoying (but harmless) error messages
+ if you skip this step.
+
+ 3) To run spamd, add the following to /etc/rc.conf:
+ spamd_enable="YES"
+
+ 4) Install mail/spamass-rules if you want some third-party
+ spam-catching rulesets
+
+SECURITY NOTE:
+By default, spamd runs as root (the AS_ROOT option). If you wish
+to change this, add the following to /etc/rc.conf:
+
+ spamd_flags="-u spamd -H /var/spool/spamd"
Modified: trunk/mail/spamassassin/files/sa-spamd.in
===================================================================
--- trunk/mail/spamassassin/files/sa-spamd.in 2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/files/sa-spamd.in 2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,7 +1,6 @@
#!/bin/sh
#
-# $FreeBSD$
-#
+# $MidnightBSD$
# PROVIDE: spamd
# REQUIRE: LOGIN
@@ -9,35 +8,48 @@
# KEYWORD: shutdown
#
-# Add the following lines to /etc/rc.conf to enable spamd:
+# Add the following line to /etc/rc.conf to enable spamd:
#
-#spamd_enable="YES"
+# spamd_enable="YES"
#
-# See spamd(8) for flags
+# You can pass flags to spamd with spamd_flags="..."
+# To change the user that spamd runs as, use
#
+# spamd_flags="-u USER [-H /path/to/home... we suggest /var/spool/spamd]"
+#
+# To keep your user-config in a SQL database, use
+#
+# spamd_flags="-Q"
+#
+# and remove -c (auto-create user preference files).
+#
. /etc/rc.subr
name=spamd
-rcvar=spamd_enable
+rcvar=${name}_enable
extra_commands="reload"
load_rc_config $name
+start_precmd="precmd"
+restart_precmd="precmd"
+
# Set defaults
: ${spamd_enable:="NO"}
: ${spamd_flags="-c %%SQL_FLAG%% %%RUN_AS_USER%%"}
-pidfile=${spamd_pidfile:-"/var/run/spamd/spamd.pid"}
-command=%%PREFIX%%/bin/spamd
+pidfile=${spamd_pidfile:-"/var/run/${name}/${name}.pid"}
+command=%%PREFIX%%/bin/${name}
command_args="-d -r ${pidfile}"
-required_dirs=%%PREFIX%%/share/spamassassin
+required_dirs="%%PREFIX%%/share/spamassassin"
-stop_postcmd=stop_postcmd
-
-stop_postcmd()
+precmd()
{
- rm -f $pidfile
+ if [ ! -d /var/run/${name} ]; then
+ mkdir -p /var/run/${name}
+ chown %%SPAMD_OWN%% /var/run/${name}
+ fi
}
run_rc_command "$1"
Deleted: trunk/mail/spamassassin/pkg-deinstall
===================================================================
--- trunk/mail/spamassassin/pkg-deinstall 2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/pkg-deinstall 2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,13 +0,0 @@
-#!/bin/sh
-
-if [ "$2" != "POST-DEINSTALL" ]; then
- exit 0
-fi
-
-USER=spamd
-
-if pw usershow "${USER}" 2>/dev/null 1>&2; then
- echo "To delete ${USER} user permanently, use 'rmuser ${USER}'"
-fi
-
-exit 0
Modified: trunk/mail/spamassassin/pkg-descr
===================================================================
--- trunk/mail/spamassassin/pkg-descr 2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/pkg-descr 2014-09-12 01:45:46 UTC (rev 16990)
@@ -11,4 +11,4 @@
Additional drop-in rule sets are available at
http://wiki.apache.org/spamassassin/CustomRulesets
-WWW: http://spamassassin.apache.org/
+WWW: http://spamassassin.apache.org/
Deleted: trunk/mail/spamassassin/pkg-install
===================================================================
--- trunk/mail/spamassassin/pkg-install 2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/pkg-install 2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,89 +0,0 @@
-#!/bin/sh
-PKG_PREFIX=${PKG_PREFIX:-/usr/local}
-USER=spamd
-GROUP=${USER}
-UID=58
-GID=${UID}
-HOME=/var/spool/${USER}
-
-if [ "$2" = "POST-INSTALL" ];then
-ask() {
- local question default answer
-
- question=$1
- default=$2
- if [ -z "${PACKAGE_BUILDING}" -a -z "${BATCH}" ]; then
- read -t120 -p "${question} [${default}]? " answer
- fi
- echo ${answer:-${default}}
-}
-
-yesno() {
- local question default answer
-
- question=$1
- default=$2
- while :; do
- answer=$(ask "${question}" "${default}")
- case "${answer}" in
- [Yy]*) return 0;;
- [Nn]*) return 1;;
- esac
- echo "Please answer yes or no."
- done
-}
- if ! pw groupshow "${GROUP}" 2>/dev/null 1>&2; then
- if pw groupadd ${GROUP} -g ${GID}; then
- echo "Added group \"${GROUP}\"."
- else
- echo "Adding group \"${GROUP}\" failed..."
- exit 1
- fi
- fi
-
- if ! pw usershow "${USER}" 2>/dev/null 1>&2; then
- if pw useradd ${USER} -u ${UID} -g ${GROUP} -h - \
- -s "/sbin/nologin" -d "${HOME}" \
- -c "SpamAssassin user"; \
- then
- echo "Added user \"${USER}\"."
- mkdir ${HOME} && chown ${USER}:${GROUP} ${HOME}
- else
- echo "Adding user \"${USER}\" failed..."
- exit 1
- fi
- fi
-
- # Create pid directory
- mkdir /var/run/spamd 2> /dev/null && chown ${USER}:${GROUP} /var/run/spamd
- /usr/bin/su root -c "${PKG_PREFIX}/bin/spamassassin -x -L --lint"
-
- if [ ${?} -eq 255 ];then
- echo "***********************************************"
- echo "*__ ___ ____ _ _ ___ _ _ ____ *"
- echo "*\ \ / / \ | _ \| \ | |_ _| \ | |/ ___|*"
- echo "* \ \ /\ / / _ \ | |_) | \| || || \| | | _ *"
- echo "* \ V V / ___ \| _ <| |\ || || |\ | |_| |*"
- echo "* \_/\_/_/ \_\_| \_\_| \_|___|_| \_|\____|*"
- echo "* *"
- echo "*You must install rules before starting spamd!*"
- echo "***********************************************"
- if [ -z "${PACKAGE_BUILDING}" -a -z "${BATCH}" ]; then
- if yesno "Do you wish to run sa-update to fetch new rules" "N";then
- ${PKG_PREFIX}/bin/sa-update || true
- else
- echo ""
- fi
- /usr/bin/su root -c "${PKG_PREFIX}/bin/spamassassin -x -L --lint"
- if [ ${?} -eq 0 ] && grep '^load.*Rule2XSBody' ${PKG_PREFIX}/etc/mail/spamassassin/v320.pre > /dev/null ;then
- if yesno "Do you wish to compile rules with re2c (will take a long time)" "N";then
- ${PKG_PREFIX}/bin/sa-compile || true
- fi
- fi
- fi
- fi
-
- exit 0
-fi # post-install
-
-exit 0
Deleted: trunk/mail/spamassassin/pkg-message
===================================================================
--- trunk/mail/spamassassin/pkg-message 2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/pkg-message 2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,38 +0,0 @@
-*************************************************************************
-* _ _____ _____ _____ _ _ _____ ___ ___ _ _ *
-* / \|_ _|_ _| ____| \ | |_ _|_ _/ _ \| \ | | *
-* / _ \ | | | | | _| | \| | | | | | | | | \| | *
-* / ___ \| | | | | |___| |\ | | | | | |_| | |\ | *
-* /_/ \_\_| |_| |_____|_| \_| |_| |___\___/|_| \_| *
-* *
-* See PREFIX/share/doc/p5-Mail-SpamAssassin/INSTALL, *
-* and PREFIX/share/doc/p5-Mail-SpamAssassin/UPGRADE, *
-* or http://spamassassin.org/dist/INSTALL and *
-* http://spamassassin.org/dist/UPGRADE BEFORE enabling *
-* this version of SpamAssassin for important information *
-* regarding changes in this version. *
-* *
-* SpamAssassin may require additional configuration in *
-* PREFIX/etc/mail/spamassassin/init.pre depending on *
-* the options you have installed. Otherwise, annoying *
-* (but harmless) error messages may result. Read the *
-* files listed above. *
-* *
-*************************************************************************
-You may wish to run sa-update now to obtain the latest rules.
-
-NOTE: BSD users: If you are updating from a version prior to 3.20.
-sa-update now places state files in /var/db/spamassassin and not
-/var/lib/spamassassin.
-
-If you run sa-compile, you will notice that files are in
-/var/db/spamassassin/compiled/<perlversion>/<version> instead of
-/var/db/spamassassin/compiled/<version>.
-No attempts have been made to move old versions over. You must recompile.
-
-If you are running with spamd, you must add the following to rc.conf:
-spamd_enable="YES"
-
-Security Note: If you did NOT deselected AS_ROOT, spamd will be running
-as root. To change this, also add this to rc.conf:
-spamd_flags="-u spamd -H /var/spool/spamd"
Modified: trunk/mail/spamassassin/pkg-plist
===================================================================
--- trunk/mail/spamassassin/pkg-plist 2014-09-12 01:42:33 UTC (rev 16989)
+++ trunk/mail/spamassassin/pkg-plist 2014-09-12 01:45:46 UTC (rev 16990)
@@ -1,4 +1,4 @@
- at stopdaemon sa-spamd
+ at unexec if service sa-spamd status | grep -q "spamd is running"; then service sa-spamd stop; fi
bin/sa-awl
bin/sa-check_spamd
bin/sa-compile
@@ -7,28 +7,96 @@
bin/spamassassin
bin/spamc
bin/spamd
- at unexec rm -rf %D/etc/mail/spamassassin/sa-update-keys || true
-etc/mail/spamassassin/local.cf.sample
- at unexec if cmp -s %B/init.pre.sample %B/init.pre; then rm -f %B/init.pre; fi
-etc/mail/spamassassin/init.pre.sample
- at exec [ -f %B/init.pre ] || cp %B/%f %B/init.pre
- at unexec if cmp -s %B/v310.pre.sample %B/v310.pre; then rm -f %B/v310.pre; fi
-etc/mail/spamassassin/v310.pre.sample
- at exec [ -f %B/v310.pre ] || cp %B/%f %B/v310.pre
- at unexec if cmp -s %B/v312.pre.sample %B/v312.pre; then rm -f %B/v312.pre; fi
-etc/mail/spamassassin/v312.pre.sample
- at exec [ -f %B/v312.pre ] || cp %B/%f %B/v312.pre
- at unexec if cmp -s %B/v320.pre.sample %B/v320.pre; then rm -f %B/v320.pre; fi
-etc/mail/spamassassin/v320.pre.sample
- at exec [ -f %B/v320.pre ] || cp %B/%f %B/v320.pre
- at unexec if cmp -s %B/v330.pre.sample %B/v330.pre; then rm -f %B/v330.pre;fi
-etc/mail/spamassassin/v330.pre.sample
- at exec [ -f %B/v330.pre ] || cp %B/%f %B/v330.pre
+ at unexec rm -rf %D/%%ETCDIR%%/sa-update-keys 2>&1 >/dev/null || true
+ at sample %%ETCDIR%%/local.cf.sample
+ at sample %%ETCDIR%%/init.pre.sample
+ at sample %%ETCDIR%%/v310.pre.sample
+ at sample %%ETCDIR%%/v312.pre.sample
+ at sample %%ETCDIR%%/v320.pre.sample
+ at sample %%ETCDIR%%/v330.pre.sample
+ at sample %%ETCDIR%%/v340.pre.sample
include/libspamc.h
lib/libspamc.so
lib/libspamc.so.0
%%SSL%%lib/libsslspamc.so
%%SSL%%lib/libsslspamc.so.0
+%%PERL5_MAN3%%/Mail::SpamAssassin.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::AICache.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::ArchiveIterator.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::AsyncLoop.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::AutoWhitelist.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Bayes.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::BayesStore.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::BayesStore::BDB.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::BayesStore::MySQL.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::BayesStore::PgSQL.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::BayesStore::Redis.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::BayesStore::SQL.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Client.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Conf.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Conf::LDAP.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Conf::Parser.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Conf::SQL.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::DnsResolver.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Logger.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Logger::File.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Logger::Stderr.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Logger::Syslog.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Message.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Message::Metadata.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Message::Node.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::PerMsgLearner.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::PerMsgStatus.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::PersistentAddrList.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::ASN.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::AWL.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::AccessDB.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::AntiVirus.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::AskDNS.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::AutoLearnThreshold.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Bayes.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::BodyRuleBaseExtractor.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Check.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::DCC.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::DKIM.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::DNSEval.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Hashcash.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::MIMEHeader.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::OneLineBodyRuleType.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::PhishTag.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Pyzor.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Razor2.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::RelayCountry.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::ReplaceTags.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Reuse.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Rule2XSBody.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::SPF.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Shortcircuit.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::SpamCop.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::Test.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::TextCat.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::URIDNSBL.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::URIDetail.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::VBounce.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Plugin::WhiteListSubject.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::PluginHandler.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::SQLBasedAddrList.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::SubProcBackChannel.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Timeout.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Util.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Util::DependencyInfo.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Util::Progress.3.gz
+%%PERL5_MAN3%%/Mail::SpamAssassin::Util::RegistrarBoundaries.3.gz
+%%PERL5_MAN3%%/spamassassin-run.3.gz
+man/man1/sa-awl.1.gz
+man/man1/sa-compile.1.gz
+man/man1/sa-learn.1.gz
+man/man1/sa-update.1.gz
+man/man1/spamassassin-run.1.gz
+man/man1/spamassassin.1.gz
+man/man1/spamc.1.gz
+man/man1/spamd.1.gz
%%SITE_PERL%%/Mail/SpamAssassin.pm
%%SITE_PERL%%/Mail/SpamAssassin/AICache.pm
%%SITE_PERL%%/Mail/SpamAssassin/ArchiveIterator.pm
@@ -42,6 +110,7 @@
%%SITE_PERL%%/Mail/SpamAssassin/BayesStore/DBM.pm
%%SITE_PERL%%/Mail/SpamAssassin/BayesStore/MySQL.pm
%%SITE_PERL%%/Mail/SpamAssassin/BayesStore/PgSQL.pm
+%%SITE_PERL%%/Mail/SpamAssassin/BayesStore/Redis.pm
%%SITE_PERL%%/Mail/SpamAssassin/BayesStore/SDBM.pm
%%SITE_PERL%%/Mail/SpamAssassin/BayesStore/SQL.pm
%%SITE_PERL%%/Mail/SpamAssassin/Client.pm
@@ -77,6 +146,7 @@
%%SITE_PERL%%/Mail/SpamAssassin/Plugin/AWL.pm
%%SITE_PERL%%/Mail/SpamAssassin/Plugin/AccessDB.pm
%%SITE_PERL%%/Mail/SpamAssassin/Plugin/AntiVirus.pm
+%%SITE_PERL%%/Mail/SpamAssassin/Plugin/AskDNS.pm
%%SITE_PERL%%/Mail/SpamAssassin/Plugin/AutoLearnThreshold.pm
%%SITE_PERL%%/Mail/SpamAssassin/Plugin/Bayes.pm
%%SITE_PERL%%/Mail/SpamAssassin/Plugin/BodyEval.pm
@@ -125,16 +195,12 @@
%%SITE_PERL%%/Mail/SpamAssassin/Util/RegistrarBoundaries.pm
%%SITE_PERL%%/Mail/SpamAssassin/Util/ScopedTimer.pm
%%SITE_PERL%%/Mail/SpamAssassin/Util/TieOneStringHash.pm
+%%SITE_PERL%%/Mail/SpamAssassin/Util/TinyRedis.pm
%%SITE_PERL%%/%%PERL_ARCH%%/auto/Mail/SpamAssassin/.packlist
%%SITE_PERL%%/spamassassin-run.pod
%%DATADIR%%/languages
%%DATADIR%%/sa-update-pubkey.txt
%%DATADIR%%/user_prefs.template
- at unexec rm -rf /var/spool/spamd
- at unexec rm -rf /var/lib/spamassassin/2* || true
- at unexec rmdir /var/lib/spamassassin 2>/dev/null || true
- at unexec rmdir /var/lib 2>/dev/null || true
- at unexec rmdir /var/db/spamassassin 2>/dev/null || true
@dirrm %%DATADIR%%
@dirrm %%SITE_PERL%%/%%PERL_ARCH%%/auto/Mail/SpamAssassin
@dirrmtry %%SITE_PERL%%/%%PERL_ARCH%%/auto/Mail
@@ -149,6 +215,23 @@
@dirrm %%SITE_PERL%%/Mail/SpamAssassin/Bayes
@dirrm %%SITE_PERL%%/Mail/SpamAssassin
@dirrmtry %%SITE_PERL%%/Mail
- at dirrmtry etc/mail/spamassassin
+ at dirrmtry %%ETCDIR%%
@dirrmtry etc/mail
- at unexec rm -rf /var/run/spamd || true
+
+ at unexec rm -rf /var/lib/spamassassin/2* 2>&1 >/dev/null || true
+ at dirrmtry /var/lib/spamassassin
+ at dirrmtry /var/lib
+ at dirrmtry /var/db/spamassassin
+
+ at unexec [ -d /var/db/spamassassin ] && echo "If you are no longer using SpamAssassin, remove /var/db/spamassassin"
+ at unexec pw usershow "%%USER%%" 2>/dev/null 1>&2 && echo "To delete %%USER%% permanently, 'rmuser %%USER%%'"
+ at unexec pw usershow "%%USER%%" 2>/dev/null 1>&2 && [ -d /var/spool/spamd ] && echo " Note that this will remove /var/spool/spamd"
+
+ at owner %%USER%%
+ at group %%GROUP%%
+ at dirrmtry /var/run/spamd
+ at group
+ at owner
+
+ at exec if [ "%%UPDATE_ON_INSTALL%%" = "yes" ]; then echo "====> Downloading SpamAssassin rulesets"; %%PREFIX%%/bin/spamassassin -x -L --lint; %%PREFIX%%/bin/sa-update || true; fi
+ at exec if [ "%%UPDATE_ON_INSTALL%%" = "yes" ]; then echo "====> Compiling SpamAssassin rulesets"; %%PREFIX%%/bin/spamassassin -x -L --lint; %%PREFIX%%/bin/sa-compile || true; fi
More information about the Midnightbsd-cvs
mailing list