I have been trying for a long while to get this port to build correctly
with staging and I am failing and could use some help so sending an
email out here. Attached is a shar archive. Please let me know any
suggestions on how to fix this. On a happy note, all my other ports are
fixed. :)
Thanks!
Rusty Nejdl
# This is a shell archive. Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file". Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
# assp.new
# assp.new/files
# assp.new/files/pkg-install.in
# assp.new/files/assp.8.in
# assp.new/files/assp.in
# assp.new/files/assplog.8.in
# assp.new/files/assplog.pl.in
# assp.new/files/patch-assp.pl
# assp.new/files/patch-rebuildspamdb.pl
# assp.new/files/510.assp.in
# assp.new/Makefile
# assp.new/distinfo
# assp.new/pkg-descr
# assp.new/pkg-plist
#
echo c - assp.new
mkdir -p assp.new > /dev/null 2>&1
echo c - assp.new/files
mkdir -p assp.new/files > /dev/null 2>&1
echo x - assp.new/files/pkg-install.in
sed 's/^X//' >assp.new/files/pkg-install.in <<
'9dc4fa2fa4a0650eeaa8804794636066'
X#!/bin/sh
X# $FreeBSD: head/mail/assp/files/pkg-install.in 340719 2014-01-22 15:52:06Z
mat $
X
Xif [ "${2}" = "POST-INSTALL" ]; then
X ASSP_USER=%%ASSP_USER%%
X ASSP_GROUP=%%ASSP_GROUP%%
X ASSP_HOME=%%ASSP_HOME%%
X ASSP_LOG=%%ASSP_LOG%%
X DATADIR=${PKG_PREFIX}/share/assp
X
X chmod -R 755 ${DATADIR}/files
X chown -R ${ASSP_USER}:${ASSP_GROUP} ${DATADIR}/files
X
X ln -sf ${DATADIR}/assp.pl ${PKG_PREFIX}/sbin/assp
X
X install -d -m 750 -o ${ASSP_USER} -g ${ASSP_GROUP} ${ASSP_LOG}
X install -d -m 700 -o ${ASSP_USER} -g ${ASSP_GROUP} ${ASSP_HOME}
X
X ln -sf ${DATADIR}/files ${ASSP_HOME}
X ln -sf ${DATADIR}/images ${ASSP_HOME}
X ln -sf ${DATADIR}/reports ${ASSP_HOME}
X ln -sf ${DATADIR}/rebuildspamdb.pl ${ASSP_HOME}
X ln -sf ${ASSP_LOG} ${ASSP_HOME}/logs
X
Xfi
9dc4fa2fa4a0650eeaa8804794636066
echo x - assp.new/files/assp.8.in
sed 's/^X//' >assp.new/files/assp.8.in << '7a524714e3995864db407eed0232e746'
X.TH assp 8 "May 16, 2005" "" "ASSP"
X.SH NAME
Xassp \- Anti-Spam SMTP Proxy
X.SH SYNOPSIS
Xassp [ base_dir [ admin_port ] ]
X.PP
X%%RC_SCRIPT%% start|stop|restart|status
X.SH DESCRIPTION
X.I "Anti-Spam SMTP Proxy"
Xis a spam filter that sits on port 25 in front
Xof your regular SMTP server
X.RI ( exim (8),
X.IR postfix (8),
X.IR qmail (8),
X.IR sendmail (8),
Xetc).
X.PP
X.I ASSP
Xrelays the SMTP dialog between an incoming client and your SMTP
Xserver, intercepting the dialog as needed.
X.I ASSP
Xperforms a number of configurable spam checks and on detecting
Xa spam message provides an immediate 5xx SMTP error code back to
Xthe client. Non-spam messages are passed to your regular SMTP server
Xfor further processing and delivery. Spam messages can be blocked
Xfrom delivery or subject-tagged and delivered.
X.PP
X.I ASSP
Xoffers:
X.RS
X.IP - 2m
Xa whitelist of known good senders
X.IP -
XBayesian checks on message headers and contents
X.IP -
Xlocal user validation using RFC822 checks, flat lists or LDAP lookup
X.IP -
Xrelay denial
X.IP -
XHELO checking
X.IP -
XSPF (Sender Policy Framework) checking
X.IP -
XDNSBL (DNS Block List) checking using many block list services
X.IP -
Xdelaying of messages from unknown senders
X.IP -
XVirus detection
X.RE
X.PP
X.I ASSP
Xis entirely administrator-managed and is almost totally
Xtransparent to users. In particular, users do not need to
Xmanage
X.IR procmail (1)
Xspam filters or challenge-response systems of their own.
X.PP
XThe
X.I base_dir
Xargument gives the name of
X.IR ASSP 's
Xworking directory. If omitted
Xit defaults to the current directory.
X.PP
X.I ASSP
Xis configured using a web interface.
XThe
X.I admin_port
Xargument gives the network port for accessing
X.IR ASSP 's
Xconfiguration menu. It defaults to 55555.
XTo access the configuration menu, start
X.I ASSP
Xand then point your browser at
X.IR http://localhost:55555 .
XThe default admin password is
X.IR nospam4me .
X.PP
XInitial setup of
X.I ASSP
Xinvolves several steps:
X.IP 1.
XReview
X.IR ASSP 's
Xconfiguration options and adjust as necessary. Be sure
Xto change the admin password. By default
X.IR ASSP 's
Xfilters are all set to
X.I "Test Mode"
Xwhich means all messages will be delivered to their recipients.
XLeave everything in Test Mode for now.
X.IP 2.
XDecide on which network port(s)
X.I ASSP
Xwill listen and on which your normal SMTP server will listen.
XTypically,
X.I ASSP
Xwill listen on port 25 and your SMTP server will be moved to
Xsomething like port 125 or 587.
X.IP 3.
XReconfigure your SMTP server to its new port.
X.IP 4.
XReconfigure
X.I ASSP
Xto port 25 and restart
X.IR ASSP .
XSince
X.I ASSP
Xis in Test Mode, all messages will be delivered to their
Xrecipients.
X.IP 5.
XArrange for all users' outbound email to be processed by
X.IR ASSP .
XThis is necessary for
X.I ASSP
Xto be able to automatically maintain its whitelist.
XIf a user's MUA uses SMTP to port 25, this will happen
Xwithout further intervention. If an MUA invokes
X.I /usr/sbin/sendmail
Xand you're using the default
X.IR sendmail (8)
Xconfiguration with submit queues, this will also happen
Xwithout further intervention. Otherwise, you need to take
Xwhatever steps are necessary for each MUA that's being used.
X.IP 6.
XOptionally, send a message containing a list of email addresses
Xthat you want to receive email from to
X.IR [email protected] .
XHave all your users do this. This will seed
X.IR ASSP 's
Xwhitelist. Messages from senders on the whitelist will
Xnever be blocked. An address can be removed from the whitelist
Xby emailing it to
X.IR [email protected] .
X.IP 7.
XTo set up the Bayesian word list filtering, do the following:
X.RS
X.IP 7a.
XEnsure some senders' addresses are in the whitelist, either
Xby sending email to them or by seeding the whilelist as described
Xabove.
X.IP 7b.
XAllow some time (could be hours or days, depending on the
Xvolume of email you receive) for enough email to collect.
XMesages from senders on the whitelist will be copied in the
X.I notspam
Xdirectory. Other messages will either be passed or be copied
Xin the
X.I spam
Xdirectory based on word scores in the initial greylist.
X.IP 7c.
XPeriodically examine the messages in
X.IR ASSP 's
X.IR notspam
Xand
X.I spam
Xdirectories to make sure they're sorted correctly. Move
Xany to the other directory as needed. If you're unsure about
Xa particular message, just delete it.
XAlso, examine
X.I maillog.txt
Xfor information about what
X.I ASSP
Xis doing.
X.IP 7d.
XAfter about 400 messages have collected, filtering mode can
Xbe enabled.
XIn the
X.I %%ASSP_HOME%%
Xdirectory, run the
X.I %%PREFIX%%/lib/assp/rebuildspamdb.pl
Xscript to create the spam database from the logged messages.
XThis is the part where the Bayesian filter ``learns'' about
Xthe words in your
X.I spam
Xand
X.I notspam
Xcollections.
X.IP 7e.
XUncheck the appropriate Test Mode box in
X.IR ASSP 's
Xconfiguration menu to enable message blocking.
X.IP 7f.
XIt is recommended that the
X.I UseSubjectsAsMaillogNames
Xconfiguration option is eventually unchecked and that the
Xscript
X.I %%PREFIX%%/lib/assp/move2num.pl
Xis run in the
X.I %%ASSP_HOME%%
Xdirectory. This causes messages to be stored with numeric
Xfilenames, and overwritten after some time. The benefits
Xof this are that the size of the stored messages will
Xbe limited and that older messages are removed from the
Xcollection. This keeps the Bayesian word list current.
XThis need not be done immediately; you can do this once
Xyou no longer feel the need to examine the spam messages
Xin detail.
X.RE
X.IP 8.
X.IR ASSP 's
Xother filtering options (local user validation, RFC822
Xconformance, client HELO validation, SPF validation,
Xthe Delay List,
Xthe use of DNSBLs and the ClamAV virus checker)
Xcan be enabled by examining and adjusting their
Xconfiguration options as needed and then unchecking the
Xappropriate Test Mode boxes.
X.PP
XOnce
X.I ASSP
Xis live, users should forward a copy of any spam message that
Xstill gets through to
X.I [email protected]
Xin order to add it to
X.IR ASSP 's
Xspam database. Any non-spam that was mis-classified as spam
Xcan be copied to
X.IR [email protected] .
X.PP
XThe
X.I rebuildspamdb.pl
Xscript needs to be re-run periodically to update the spam database
Xfrom the latest logged messages. There is a
X.IR periodic (8)
Xscript that will do this overnight.
X.PP
XFor full details of using
X.IR ASSP ,
Xsee the
X.I ASSP
Xwebsite and documentation.
X.SH "STARTING ASSP AT BOOT TIME"
XThe
X.I %%RC_SCRIPT%%
Xscript is run automatically at system boot time.
XSeveral variables can be set in
X.I /etc/rc.conf
Xto control the behavior.
X.IP assp_enable
Xset to
X.I "YES"
Xto start ASSP at boot time
X.IP assp_flags
Xpassed to the ASSP client, default is
X.I assp_flags="%%ASSP_HOME%%"
X.IP assp_logexpire
Xused by nightly script to expire logs, default is
X.I assp_logexpire="45"
Xdays
X.SH FILES
X.IP %%ASSP_HOME%%
Xlocation of ASSP config file, log file and spam databases
X.IP %%ASSP_HOME%%/notspam
Xcopies of non-spam messages received
X.IP %%ASSP_HOME%%/spam
Xcopies of spam messages received
X.IP %%ASSP_HOME%%/errors/{notspam,spam}
Xmessages forwarded to asspnotspam@ and asspspam@ addresses
X.IP %%ASSP_HOME%%/maillog.txt
X.IR ASSP 's
Xlog file
X.IP %%PREFIX%%/lib/assp/freshclam.sh
Xscript to update virus definitions
X.IP %%PREFIX%%/lib/assp/move2num.pl
Xscript to rename stored messages to numeric filenames
X.IP %%PREFIX%%/lib/assp/rebuildspamdb.pl
Xscript to update spam database
X.IP %%PREFIX%%/etc/periodic/daily/510.assp
Xnightly script to invoke
X.I rebuildspamdb.pl
Xand
X.IR freshclam.sh .
X.SH "SEE ALSO"
X.IR procmail (1),
X.IR assplog (8),
X.IR exim (8),
X.IR postfix (8),
X.IR qmail (8),
X.IR sendmail (8),
X%%PREFIX%%/share/doc/assp/ASSP Documentation.htm
X.br
Xhttp://assp.sourceforge.net/
7a524714e3995864db407eed0232e746
echo x - assp.new/files/assp.in
sed 's/^X//' >assp.new/files/assp.in << '0cd6e245b5b0a02745a3841dbd04e871'
X#!/bin/sh
X#
X# $FreeBSD: head/mail/assp/files/assp.in 340872 2014-01-24 00:14:07Z mat $
X#
X
X# PROVIDE: assp
X# REQUIRE: LOGIN
X# KEYWORD: shutdown
X
X. /etc/rc.subr
X
Xname=assp
Xrcvar=assp_enable
X
Xcommand=%%PREFIX%%/sbin/assp
Xcommand_interpreter=%%PERL%%
Xpidfile=%%ASSP_HOME%%/pid
X
Xload_rc_config $name
X: ${assp_enable="NO"}
X: ${assp_flags="%%ASSP_HOME%%"}
X
Xrun_rc_command "$1"
0cd6e245b5b0a02745a3841dbd04e871
echo x - assp.new/files/assplog.8.in
sed 's/^X//' >assp.new/files/assplog.8.in << '747367079a113d99231487b62c4140e6'
X.TH assplog 8 "May 16, 2005" "" "ASSP"
X.SH NAME
Xassplog \- ASSP log pretty-printer
X.SH SYNOPSIS
Xassplog
X.SH DESCRIPTION
X.I assplog
Xuses
X.B "tail -f"
Xto monitor the ASSP Anti-Spam SMTP Proxy log and then displays
Xlogged messages using ANSI color sequences and reformatted to
Xa consistent layout for easy reading.
X.PP
X.I assplog
Xworks best on terminal windows of around 120 columns or wider.
XIt also assumes a black background as whitelisted messages are
Xdisplayed colored white. If you normally use a white background,
Xuse Ctrl-MiddleButton and select Enable Reverse Video.
X.PP
XThe colors have the following meaning:
X.PP
X1. Messages that were delivered
X.RS
X.TP
XWhite
XSender was on whitelist (or was added to whitelist)
X.TP
XGreen
XMessage passed all checks and was delivered
X.RE
X.PP
X2. Messages that were blocked
X.RS
X.TP
XCyan
XMessage was delayed (sending MTA should retry later)
X.TP
XBlue
XRecipient unknown (failed flat list or LDAP check)
X.TP
XMagenta
XMessage failed any of the other checks
X.TP
XRed
XMessage failed Bayesian spam check
X.RE
X.PP
X3. Administrative messages
X.RS
X.TP
XYellow
XAdmin change from web interface
X.TP
XGrey
XMessages about ASSP's operation, including messages to
Xassp{notspam,spam,white}@ address
X.RE
X.SH BUGS
XNote that
X.I assplog
Xsuppresses some of the message lines from the in actual log (those that report
Xpenalty scoring and some socket level information, for example).
XUnknown/new log messages are not colorized.
XFOR A COMPLETE AND ACCURATE VIEW OF
XTHE LOG, USE
X.B "tail -f"
XDIRECTLY ON THE LOG FILE.
X.SH FILES
X.IP %%ASSP_HOME%%/maillog.txt
Xlocation of ASSP log file
X.SH "SEE ALSO"
X.IR assp (8),
X.IR tail (1)
747367079a113d99231487b62c4140e6
echo x - assp.new/files/assplog.pl.in
sed 's/^X//' >assp.new/files/assplog.pl.in << '1f4c2ed7ff8ade51852634d0efd13b34'
X#!%%PREFIX%%/bin/perl
X# assplog.pl
X# ASSP log pretty-printer
X#
X
X# xterm foreground color codes
X$black = "30";
X$red = "31";
X$green = "32";
X$yellow = "33";
X$blue = "34";
X$magenta = "35";
X$cyan = "36";
X$white = "37";
X
X$columns = $ENV{"COLUMNS"};
X$columns = 120 if (!$columns || $columns < 120);
X
X$lines = $ENV{"LINES"};
X$lines = 50 if (!$lines);
X
Xif (!open (LOG, "tail -500f %%ASSP_LOG%%/maillog.txt |")) {
X print STDERR "assplog: cannot open ASSP log\n";
X exit(1);
X}
X
X$ipwide = 0;
Xwhile (<LOG>) {
X chop;
X undef $l;
X ($l->{date}, $l->{time}, $l->{rest}) = split(/\s+/, $_, 3);
X $patt = ".*[0-9][0-9][0-9][0-9][0-9]-[0-9][0-9][0-9][0-9][0-9]";
X if ($l->{rest} =~ m,^($patt)\s,) {
X ($l->{msgid}, $l->{rest}) = $l->{rest} =~ m,^($patt)\s+(.*)$,;
X }
X $patt = "\\[[^]]+]";
X if ($l->{rest} =~ m,^($patt)\s,) {
X ($l->{code}, $l->{rest}) = $l->{rest} =~ m,^($patt)\s+(.*)$,;
X }
X $patt =
"[0-9]+\\.[0-9]+\\.[0-9]+\\.[0-9]+|(:?[0-9a-fA-F]*){0,7}:[0-9a-fA-F]+";
X if ($l->{rest} =~ m,^($patt)\s,) {
X ($l->{cliIP}, $x, $l->{rest}) = $l->{rest} =~
m,^($patt)\s+(.*)$,;
X }
X $patt = "<([^@>]+@[^@>]+)?>";
X if ($l->{rest} =~ m,^($patt)\s,) {
X ($l->{sender}, $x, $l->{rest}) = $l->{rest} =~
m,^($patt)\s+(.*)$,;
X }
X $l->{code} = "[BlockReport]" if ($l->{rest} =~ /blocked email
report/);
X $l->{code} = "[Connection]" if ($l->{rest} =~ /Connection idle for
[0-9]+ secs - timeout/);
X $l->{code} = "[DenyStrict]" if ($l->{rest} =~ /denied by
denySMTPConnections strict:/);
X $l->{code} = "[SenderBaseErr]" if ($l->{rest} =~ / Foreign Country/);
X $l->{code} = "[SpamReport]" if ($l->{rest} =~
/^(H|Sp)am-Report:|email: (sp|h)amreport/);
X $l->{code} = "[MaxErrors]" if ($l->{rest} =~ /max errors
\([0-9]+\) exceeded -- dropping connection/);
X $l->{code} = "[Connection]" if ($l->{rest} =~ /no recipients left
-- dropping connection/);
X $l->{code} = "[Connection]" if ($l->{rest} =~ /not delayed /);
X $l->{code} = "[RWL]" if ($l->{rest} =~ /Received-RWL:
whitelisted from/);
X $l->{code} = "[Delayed]" if ($l->{rest} =~ /recipient delayed:/);
X $l->{code} = "[SPF]" if ($l->{rest} =~ /Regex:SPFstrict/);
X $l->{code} = "[SenderBase]" if ($l->{rest} =~ / Regex:WhiteOrg/);
X $l->{code} = "[SenderBaseInfo]" if ($l->{rest} =~ /SenderBase Info/);
X $l->{code} = "[Connection]" if ($l->{rest} =~ /\[SMTP Status]/);
X $l->{code} = "[SenderBase]" if ($l->{rest} =~ /White
Organization\/Domain in SenderBase:/);
X $l->{code} = "[WhiteAddition]" if ($l->{rest} =~ /whitelist addition/);
X $l->{code} = "[WhiteDeletion]" if ($l->{rest} =~ /whitelist deletion/);
X if ($l->{code}) {
X next if ($l->{code} =~ /\[SMTP Error]/);
X next if ($l->{code} =~ /\[SMTP Reply]/);
X next if ($l->{code} =~ /\[spam found]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[Attachment]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[Backscatter]/);
X $l->{color} = $red if ($l->{code} =~ /\[Bayesian]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[BlackDomain]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[BlackHELO]/);
X $l->{color} = $white if ($l->{code} =~ /\[BlockReport]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[BombBlack]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[BombData]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[BombHeader]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[BombRaw]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[BombScript]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[BombSender]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[BounceAddress]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[Collect]/);
X $l->{color} = $black if ($l->{code} =~ /\[Connection]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[CountryCode]/);
X $l->{color} = $cyan if ($l->{code} =~ /\[Delayed]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[DenyIP]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[DenyStrict]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[DNSBL]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[Extreme]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[ForgedHELO]/);
X $l->{color} = $magenta if ($l->{code} =~
/\[ForgedLocalSender]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[FromMissing]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[History]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[InternalAddress]/);
X $l->{color} = $blue if ($l->{code} =~ /\[InvalidAddress]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[InvalidHELO]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[IPfrequency]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[IPperDomain]/);
X $l->{color} = $white if ($l->{code} =~ /\[Local]/);
X $l->{color} = $magenta if ($l->{code} =~
/\[MalformedAddress]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[MaxErrors]/);
X $l->{color} = $green if ($l->{code} =~ /\[MessageOK]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[MessageScore]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[MissingMX]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[MsgID]/);
X $l->{color} = $green if ($l->{code} =~ /\[NoProcessing]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[Organization]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[OversizedHeader]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[PenaltyBox]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[Penalty]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[PTRinvalid]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[PTRmissing]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[RelayAttempt]/);
X $l->{color} = $green if ($l->{code} =~ /\[RWL]/);
X $l->{color} = $green if ($l->{code} =~ /\[SenderBase]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[SenderBaseErr]/);
X $l->{color} = $black if ($l->{code} =~ /\[SenderBaseInfo]/);
X $l->{color} = $black if ($l->{code} =~ /\[SpamReport]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[SPF]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[SpoofedSender]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[SRS]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[SuspiciousHelo]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[Trap]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[URIBL]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[VIRUS]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[ValidHELO]/);
X $l->{color} = $white if ($l->{code} =~ /\[WhiteAddition]/);
X $l->{color} = $white if ($l->{code} =~ /\[WhiteDeletion]/);
X $l->{color} = $white if ($l->{code} =~ /\[Whitelisted]/);
X $l->{color} = $magenta if ($l->{code} =~ /\[WhitelistOnly]/);
X $ipwide-- if ($ipwide == 2 && $lines2 > $lines-1);
X $ipwide-- if ($ipwide == 1 && $lines1 > $lines-1);
X if ($l->{cliIP} =~ /:/ && length($l->{cliIP}) > 20) {
X $ipwide = 2 if ($ipwide < 2);
X $lines2 = 0;
X }
X elsif ($l->{cliIP} =~ /:/) {
X $ipwide = 1 if ($ipwide < 1);
X $lines1 = 0;
X }
X if ($ipwide == 2) {
X $cols = $columns - 9 - 1 - 8 - 1 - 39 - 1 - 18 - 1 - 28
- 1;
X printf "$l->{date} $l->{time} \033[1;$l->{color}m%-39s
%-18s %-28.28s %-${cols}.${cols}s\033[0m\n", $l->{cliIP}, $l->{code},
$l->{sender}, $l->{rest};
X }
X elsif ($ipwide == 1) {
X $cols = $columns - 9 - 1 - 8 - 1 - 20 - 1 - 18 - 1 - 28
- 1;
X printf "$l->{date} $l->{time} \033[1;$l->{color}m%-20s
%-18s %-28.28s %-${cols}.${cols}s\033[0m\n", $l->{cliIP}, $l->{code},
$l->{sender}, $l->{rest};
X }
X else {
X $cols = $columns - 9 - 1 - 8 - 1 - 15 - 1 - 18 - 1 - 28
- 1;
X printf "$l->{date} $l->{time} \033[1;$l->{color}m%-15s
%-18s %-28.28s %-${cols}.${cols}s\033[0m\n", $l->{cliIP}, $l->{code},
$l->{sender}, $l->{rest};
X }
X $lines1++;
X $lines2++;
X }
X elsif ($l->{rest} =~ /^Admin/) {
X $l->{color} = $yellow;
X $cols = $columns - 9 - 1 - 8 - 1;
X printf "$l->{date} $l->{time}
\033[1;$l->{color}m%-${cols}.${cols}s\033[0m\n", $l->{rest};
X $lines1++;
X $lines2++;
X }
X else {
X next if ($l->{rest} =~ /converting to SSL$/);
X next if ($l->{rest} =~ /^found .* in VERIFY-cache$/);
X next if ($l->{rest} =~ /IP-Score/);
X next if ($l->{rest} =~ /MessageScore/);
X next if ($l->{rest} =~ /Name Server .* ResponseTime/);
X next if ($l->{rest} =~ /New connection on the secure SSL port/);
X next if ($l->{rest} =~ /\[SMTP Error]/);
X next if ($l->{rest} =~ /\[SMTP Reply]/);
X next if ($l->{rest} =~ /\[spam found]/);
X next if ($l->{rest} =~ /^to: .* found .* in VERIFY-cache$/);
X next if ($l->{rest} =~ /^VRFY added .* to VRFY-\/LDAPlist$/);
X $l->{color} = $black;
X $cols = $columns - 9 - 1 - 8 - 1;
X printf "$l->{date} $l->{time}
\033[1;$l->{color}m%-${cols}.${cols}s\033[0m\n", $l->{rest};
X $lines1++;
X $lines2++;
X }
X}
X
Xclose(LOG);
Xexit(0);
1f4c2ed7ff8ade51852634d0efd13b34
echo x - assp.new/files/patch-assp.pl
sed 's/^X//' >assp.new/files/patch-assp.pl << 'bc9edae213d82e823413cc5d1b2c5786'
X--- assp.pl.orig 2014-05-18 12:18:45.000000000 -0500
X+++ assp.pl 2014-05-18 14:40:06.000000000 -0500
X@@ -2903,11 +2903,11 @@
X 'Set the characterset/codepage for the maillog output to your local needs.
Best on non Windows systems is "utf8" if available or "System Default" - no
conversion. On Windows systems set it to your local codepage or UTF-8 (chcp
65001). To display nonASCII characters in the subject line and maillog files
names setup decodeMIME2UTF8 .'],
X ['decodeMIME2UTF8','Decode MIME Words To
UTF-8',1,\&checkbox,'1','(.*)',undef,'If selected, ASSP decodes MIME encoded
words to UTF8. This enables support for national languages to be used in Bombs
, Scripts , Spamdb , Logging. If not selected, only US-ASCII characters will be
used for this functions. This requires an installed Email::MIME module in
PERL.'],
X ['AsAService','Run ASSP as a Windows
Service',0,\&checkbox,'','(.*)',undef,'In Windows NT/2000/XP/2003 ASSP can be
installed as a service. This setting tells ASSP that this has been done -- it
does not install the Windows service for you. Installing ASSP as a service
requires several steps which are detailed in the <a
href="http://apps.sourceforge.net/mediawiki/assp/index.php?title=Win32">Quick
Start for Win32</a> doku page.<br /> Information about the Win32::Daemon module
which which is necessary can be found here: <a
href="http://www.roth.net/perl/Daemon/">The Official Win32::Daemon Home
Page</a><br /><span class="negative"> requires ASSP restart</span>'],
X-['AsADaemon','Run ASSP as a Daemon',0,\&checkbox,'','(.*)',undef,'In
Linux/BSD/Unix/OSX fork and exit. Similar to the command "perl assp.pl &",
but better.<br />
X+['AsADaemon','Run ASSP as a Daemon',0,\&checkbox,'1','(.*)',undef,'In
Linux/BSD/Unix/OSX fork and exit. Similar to the command "perl assp.pl &",
but better.<br />
X <span class="negative"> Changing this requires a restart of ASSP.</span>'],
X-['runAsUser','Run as UID',20,\&textinput,'','(\S*)',undef,'The *nix user name
to assume after startup (*nix only).<p><small><i>Examples:</i> assp,
nobody</small></p>
X+['runAsUser','Run as UID',20,\&textinput,'assp','(\S*)',undef,'The *nix user
name to assume after startup (*nix only).<p><small><i>Examples:</i> assp,
nobody</small></p>
X <span class="negative"> Changing this requires a restart of ASSP.</span>'],
X-['runAsGroup','Run as GID',20,\&textinput,'','(\S*)',undef,'The *nix group to
assume after startup (*nix only).<p><small><i>Examples:</i> assp,
nobody</small></p>
X+['runAsGroup','Run as GID',20,\&textinput,assp'','(\S*)',undef,'The *nix
group to assume after startup (*nix only).<p><small><i>Examples:</i> assp,
nobody</small></p>
X <span class="negative"> Changing this requires a restart of ASSP.</span>'],
X ['ChangeRoot','Change Root',40,\&textinput,'','(.*)',undef,'The new root
directory to which ASSP should chroot (*nix only). If blank, no chroot jail
will be used. Note: if you use this feature, be sure to copy or link the
etc/protocols file in your chroot jail.<br />
X <span class="negative"> Changing this requires a restart of ASSP.</span>'],
X@@ -47223,4 +47223,4 @@
X );
X }
X 1;
X-
X\ No newline at end of file
X+
bc9edae213d82e823413cc5d1b2c5786
echo x - assp.new/files/patch-rebuildspamdb.pl
sed 's/^X//' >assp.new/files/patch-rebuildspamdb.pl <<
'8a5416427140b741d66efabdd36599b1'
X--- rebuildspamdb.pl.orig 2010-12-09 22:50:45.000000000 -0600
X+++ rebuildspamdb.pl 2010-12-10 14:54:49.000000000 -0600
X@@ -51,7 +51,7 @@
X # the last one is the one used if all else fails
X $base = cwd();
X unless (-e "$base/assp.cfg") {
X- foreach
('.','/usr/local/assp','/home/assp','/etc/assp','/usr/assp','/applications/assp','/assp','.')
{
X+ foreach
('.','/usr/local/assp','/home/assp','/etc/assp','/usr/assp','/applications/assp','/assp','/var/db/assp')
{
X if (-e "$_/assp.cfg") {
X $base=$_;
X last ;
8a5416427140b741d66efabdd36599b1
echo x - assp.new/files/510.assp.in
sed 's/^X//' >assp.new/files/510.assp.in << '07d52aeb5c82dfa3b29e68d16813146f'
X#!/bin/sh
X#
X# $FreeBSD: head/mail/assp/files/510.assp.in 340872 2014-01-24 00:14:07Z mat $
X#
X# Run ASSP's nightly housekeeping script, rebuildspamdb.pl
X# Delete old ASSP log files
X
Xcd %%ASSP_HOME%%
X
Xif [ ! -f %%DATADIR%%/rebuildspamdb.pl ]
Xthen
X echo "%%DATADIR%%/rebuildspamdb.pl does not exist"
X rc_spamdb=2
Xelse
X echo ""
X echo "Running ASSP rebuildspamdb.pl:"
X %%PERL%% %%DATADIR%%/rebuildspamdb.pl && rc_spamdb=0 || rc_spamdb=3
X chown -R %%ASSP_USER%%:%%ASSP_GROUP%% %%ASSP_HOME%%
Xfi
X
X. /etc/rc.subr
Xname=assp
Xrcvar=assp_enable
Xload_rc_config $name
X: ${assp_logexpire="45"}
X
Xecho ""
Xecho "Removing old ASSP log files:"
Xfind -L . -name '*.maillog.txt' -mtime +$assp_logexpire -exec ls -l {} \;
-exec rm {} \;
X
Xexit $rc_spamdb
07d52aeb5c82dfa3b29e68d16813146f
echo x - assp.new/Makefile
sed 's/^X//' >assp.new/Makefile << '3882c062c0d0b3369ba8204e2ca20fcc'
X# Created by: J.R. Oldroyd <[email protected]>
X# $FreeBSD: head/mail/assp/Makefile 352986 2014-05-05 09:45:36Z bapt $
X
XPORTNAME= assp
XPORTVERSION= 1.9.9.14158
XPORTEPOCH= 1
XCATEGORIES= mail
XMASTER_SITES= http://www.ringofsaturn.com/distfiles/
XDISTNAME= ${PORTNAME:tu}_${PORTVERSION}_Install
X
XMAINTAINER= [email protected]
XCOMMENT= Anti-Spam SMTP Proxy
X
XUSES= perl5 zip:infozip
XNO_BUILD= yes
XUSE_PERL5= run
X
XMAN8= assp.8 assplog.8
X
XASSP_USER= assp
XASSP_GROUP= assp
XUSERS= ${ASSP_USER}
XGROUPS= ${ASSP_GROUP}
XASSP_HOME= /var/db/assp
XASSP_LOG= /var/log/assp
X
XPLIST_SUB= ASSP_HOME="${STAGEDIR}${ASSP_HOME}"
ASSP_LOG="${STAGEDIR}${ASSP_LOG}"
X
XSUB_FILES= 510.assp assp.8 assplog.8 assplog.pl pkg-install
XSUB_LIST= ASSP_USER="${ASSP_USER}" ASSP_GROUP="${ASSP_GROUP}" \
X ASSP_HOME="${ASSP_HOME}" ASSP_LOG="${ASSP_LOG}" \
X DATADIR="${DATADIR}" PERL="${PERL}"
X
XUSE_RC_SUBR= ${PORTNAME}
X
XOPTIONS_DEFINE= EMVALID LDAP SPF SRS SEND FBACKW CLAMAV DNSBL MYSQL \
X MATCHRE SENDERB MIMEMOD SSL IPV6
X
XEMVALID_DESC= RFC822 recipient address validator
XLDAP_DESC= LDAP validation of recipient addresses
XSPF_DESC= SPF validation of client IP
XSRS_DESC= Sender Rewriting Scheme
XSEND_DESC= Resending .eml files
XFBACKW_DESC= File Reading Backwards
XCLAMAV_DESC= ClamAV virus scanner
XDNSBL_DESC= DNS block list checking
XMYSQL_DESC= Use MySQL db to store white/red/delaylists
XMATCHRE_DESC= Match IP ranges and CIDR blocks in lists
XSENDERB_DESC= Country Code checks
XMIMEMOD_DESC= Multiple Attachement detection
XSSL_DESC= SSL secure sockets support
XIPV6_DESC= IPv6 sockets support
X
XOPTIONS_DEFAULT= EMVALID SPF SRS SEND FBACKW CLAMAV DNSBL MATCHRE
SENDERB MIMEMOD SSL IPV6
X
XWRKSRC=
${WRKDIR}/${PORTNAME}-${PORTVERSION}/ASSP_1.9.9_14158_install/${PORTNAME:tu}
X
X.include <bsd.port.pre.mk>
X
XRUN_DEPENDS+= p5-Net-DNS>=0.68:${PORTSDIR}/dns/p5-Net-DNS \
X p5-libwww>=6.04:${PORTSDIR}/www/p5-libwww \
X p5-HTML-Parser>=3.69:${PORTSDIR}/www/p5-HTML-Parser
X
X.if ${PORT_OPTIONS:MEMVALID}
XRUN_DEPENDS+= p5-Email-Valid>=0.190:${PORTSDIR}/mail/p5-Email-Valid
X.endif
X
X.if ${PORT_OPTIONS:MLDAP}
XRUN_DEPENDS+= p5-perl-ldap>=0.4400:${PORTSDIR}/net/p5-perl-ldap
X.endif
X
X.if ${PORT_OPTIONS:MSPF}
XRUN_DEPENDS+= p5-Mail-SPF>=2.007:${PORTSDIR}/mail/p5-Mail-SPF
X.endif
X
X.if ${PORT_OPTIONS:MSRS}
XRUN_DEPENDS+= p5-Mail-SRS>=0.31:${PORTSDIR}/mail/p5-Mail-SRS
X.endif
X
X.if ${PORT_OPTIONS:MSEND}
XRUN_DEPENDS+= p5-Email-Send>=2.198:${PORTSDIR}/mail/p5-Email-Send
X.endif
X
X.if ${PORT_OPTIONS:MFBACKW}
XRUN_DEPENDS+=
p5-File-ReadBackwards>=1.05:${PORTSDIR}/devel/p5-File-ReadBackwards
X.endif
X
X.if ${PORT_OPTIONS:MCLAMAV}
XRUN_DEPENDS+=
p5-File-Scan-ClamAV>=1.9.1:${PORTSDIR}/security/p5-File-Scan-ClamAV
XPLIST_SUB+= ASSP_CLAMAV=""
X.else
XPLIST_SUB+= ASSP_CLAMAV="@comment "
X.endif
X
X.if ${PORT_OPTIONS:MDNSBL}
XRUN_DEPENDS+= p5-Net-DNS>=0.68:${PORTSDIR}/dns/p5-Net-DNS
X.endif
X
X.if ${PORT_OPTIONS:MMYSQL}
XRUN_DEPENDS+= p5-Tie-DBI>=1.05:${PORTSDIR}/databases/p5-Tie-DBI
XRUN_DEPENDS+= p5-DBD-mysql>=0:${PORTSDIR}/databases/p5-DBD-mysql
X.endif
X
X.if ${PORT_OPTIONS:MMATCHRE}
XRUN_DEPENDS+=
p5-Net-IP-Match-Regexp>=1.01:${PORTSDIR}/net-mgmt/p5-Net-IP-Match-Regexp
X.endif
X
X.if ${PORT_OPTIONS:MSENDERB}
XRUN_DEPENDS+= p5-Net-SenderBase>=1.02:${PORTSDIR}/mail/p5-Net-SenderBase
X.endif
X
X.if ${PORT_OPTIONS:MMIMEMOD}
XRUN_DEPENDS+= p5-Email-MIME>=1.910:${PORTSDIR}/mail/p5-Email-MIME
X.endif
X
X.if ${PORT_OPTIONS:MSSL}
XRUN_DEPENDS+= p5-IO-Socket-SSL>=1.74:${PORTSDIR}/security/p5-IO-Socket-SSL
X.endif
X
X.if ${PORT_OPTIONS:MIPV6}
XRUN_DEPENDS+= p5-IO-Socket-INET6>=2.69:${PORTSDIR}/net/p5-IO-Socket-INET6
X.endif
X
XEXTRACT_AFTER_ARGS= -d ${PORTNAME}-${PORTVERSION}
X
Xpost-patch:
X @${REINPLACE_CMD} -e 's|/usr/bin/perl|${PERL}|' ${WRKSRC}/*.pl
X
Xdo-install:
X ${MKDIR} ${STAGEDIR}${DATADIR}
X ${INSTALL_SCRIPT} ${WRKSRC}/assp.pl ${STAGEDIR}${DATADIR}
X ${INSTALL_SCRIPT} ${WRKSRC}/rebuildspamdb.pl ${STAGEDIR}${DATADIR}
X ${INSTALL_SCRIPT} ${WRKSRC}/stat.pl ${STAGEDIR}${DATADIR}
X
X ( cd ${WRKSRC} && ${COPYTREE_SHARE} "files images reports" \
X ${STAGEDIR}${DATADIR}/ "! -name '*.orig' ! -name '*.bak'" )
X
X ${INSTALL_SCRIPT} ${WRKDIR}/assplog.pl ${STAGEDIR}${PREFIX}/sbin/assplog
X
X ${INSTALL_MAN} ${WRKDIR}/assp.8 ${STAGEDIR}${MAN8PREFIX}/man/man8
X ${INSTALL_MAN} ${WRKDIR}/assplog.8 ${STAGEDIR}${MAN8PREFIX}/man/man8
X
X ${MKDIR} ${STAGEDIR}${PREFIX}/etc/periodic/daily
X ${INSTALL_SCRIPT} ${WRKDIR}/510.assp
${STAGEDIR}${PREFIX}/etc/periodic/daily/
X
X.if ${PORT_OPTIONS:MDOCS}
X ${MKDIR} ${STAGEDIR}${DOCSDIR}
X ${INSTALL_DATA} ${WRKSRC}/docs/*.htm ${STAGEDIR}${DOCSDIR}
X.endif
X
Xpost-install:
X @PKG_PREFIX=${STAGEDIR}${PREFIX} ${SH} ${PKGINSTALL} ${PKGNAME}
POST-INSTALL
X
X.include <bsd.port.post.mk>
3882c062c0d0b3369ba8204e2ca20fcc
echo x - assp.new/distinfo
sed 's/^X//' >assp.new/distinfo << '6e03a23822f1624ef3a2e7caf40a305f'
XSHA256 (ASSP_1.9.9.14158_Install.zip) =
1237a965ca3475a5cdabf786d470d295ce70ff030307d903b979b8c7ac80e186
XSIZE (ASSP_1.9.9.14158_Install.zip) = 1347031
6e03a23822f1624ef3a2e7caf40a305f
echo x - assp.new/pkg-descr
sed 's/^X//' >assp.new/pkg-descr << 'ed7b307fe6ef1924e1ca841113831e6b'
XAnti-Spam SMTP Proxy is a spam filter that sits on port 25 in front of your
Xregular SMTP server (sendmail, postfix, qmail, etc).
X
XASSP performs a number of configurable spam checks, and on detecting a spam
Xmessage, provides an immediate 5xx SMTP error code back to the client.
XNon-spam messages are passed to your regular SMTP server for further
Xprocessing and delivery. ASSP includes SSL and IPv6 support. It is a single
Xscript with a web-based configuration tool.
X
XASSP offers:
X - a whitelist of known good senders
X - Bayesian checks on message headers and contents
X - recipient address validation using LDAP and RFC822 conformance
X - relay denial
X - HELO checking
X - SPF (Sender Policy Framework) checking
X - DNSBL (DNS Block List) checking using many DNSBL services
X - various SMTP error modes detection
X - Virus detection
Xand many other spam detection techniques.
X
XWWW: http://assp.sourceforge.net/
XWWW: http://opal.com/jr/freebsd/ports/mail/assp/
ed7b307fe6ef1924e1ca841113831e6b
echo x - assp.new/pkg-plist
sed 's/^X//' >assp.new/pkg-plist << '8fe14914ad0f8fb4f6a02249d845e387'
Xetc/periodic/daily/510.assp
Xsbin/assp
Xsbin/assplog
X%%DATADIR%%/assp.pl
X%%DATADIR%%/files/URIBLCCTLDS.txt
X%%DATADIR%%/files/blackaddresses.txt
X%%DATADIR%%/files/blackdomains.txt
X%%DATADIR%%/files/blackre.txt
X%%DATADIR%%/files/blockreportlist.txt
X%%DATADIR%%/files/blacksenderbase.txt
X%%DATADIR%%/files/bombdatare.txt
X%%DATADIR%%/files/bombheaderre.txt
X%%DATADIR%%/files/bombre.txt
X%%DATADIR%%/files/bombsenderre.txt
X%%DATADIR%%/files/bombsubjectre.txt
X%%DATADIR%%/files/charsets.txt
X%%DATADIR%%/files/checkdomains.txt
X%%DATADIR%%/files/deny.txt
X%%DATADIR%%/files/denyalways.txt
X%%DATADIR%%/files/dnsbls.txt
X%%DATADIR%%/files/dnsrws.txt
X%%DATADIR%%/files/droplist.txt
X%%DATADIR%%/files/groups.txt
X%%DATADIR%%/files/invalidhelo.txt
X%%DATADIR%%/files/invalidptr.txt
X%%DATADIR%%/files/ipnp.txt
X%%DATADIR%%/files/ipnpexclude.txt
X%%DATADIR%%/files/noblocking.txt
X%%DATADIR%%/files/nodelay.txt
X%%DATADIR%%/files/nodelayhelosre.txt
X%%DATADIR%%/files/nogrip.txt
X%%DATADIR%%/files/nookcaching.txt
X%%DATADIR%%/files/nopbwhite.txt
X%%DATADIR%%/files/notls.txt
X%%DATADIR%%/files/nowhite.txt
X%%DATADIR%%/files/npre.txt
X%%DATADIR%%/files/preheaderre.txt
X%%DATADIR%%/files/rcptreplrules.txt
X%%DATADIR%%/files/redre.txt
X%%DATADIR%%/files/rebuildspamdb.pl
X%%DATADIR%%/files/samesubjectskip.txt
X%%DATADIR%%/files/strictspf.txt
X%%DATADIR%%/files/subjectre.txt
X%%DATADIR%%/files/suspiciousre.txt
X%%DATADIR%%/files/suspiciousvirus.txt
X%%DATADIR%%/files/tlds-alpha-by-domain.txt
X%%DATADIR%%/files/uriblwhite.txt
X%%DATADIR%%/files/uriblserviceprovider.txt
X%%DATADIR%%/files/validhelo.txt
X%%DATADIR%%/files/validptr.txt
X%%DATADIR%%/files/whiteptr.txt
X%%DATADIR%%/files/whitesenderbase.txt
X%%DATADIR%%/images/assp.css
X%%DATADIR%%/images/blockreport.css
X%%DATADIR%%/images/blockreport.gif
X%%DATADIR%%/images/blockreporticon.gif
X%%DATADIR%%/images/dropShadow.gif
X%%DATADIR%%/images/editor.css
X%%DATADIR%%/images/favicon.ico
X%%DATADIR%%/images/info.png
X%%DATADIR%%/images/loading.gif
X%%DATADIR%%/images/logo.gif
X%%DATADIR%%/images/logo1.jpg
X%%DATADIR%%/images/minusIcon.png
X%%DATADIR%%/images/noIcon.png
X%%DATADIR%%/images/opensource-logo.gif
X%%DATADIR%%/images/plusIcon.png
X%%DATADIR%%/images/shutdown.css
X%%DATADIR%%/images/sourceforge-logo.gif
X%%DATADIR%%/images/valid-xhtml10.gif
X%%DATADIR%%/images/village.gif
X%%DATADIR%%/images/xml-pill.gif
X%%DATADIR%%/rebuildspamdb.pl
X%%DATADIR%%/reports/analyzereport.txt
X%%DATADIR%%/reports/blackremovereport.txt
X%%DATADIR%%/reports/blackreport.txt
X%%DATADIR%%/reports/blockreport_html.txt
X%%DATADIR%%/reports/blockreport_sub.txt
X%%DATADIR%%/reports/blockreport_text.txt
X%%DATADIR%%/reports/blockreportfile.txt
X%%DATADIR%%/reports/denied.txt
X%%DATADIR%%/reports/helpreport.txt
X%%DATADIR%%/reports/notspamreport.txt
X%%DATADIR%%/reports/npremovereport.txt
X%%DATADIR%%/reports/npreport.txt
X%%DATADIR%%/reports/persblackreport.txt
X%%DATADIR%%/reports/redremovereport.txt
X%%DATADIR%%/reports/redreport.txt
X%%DATADIR%%/reports/slremovereport.txt
X%%DATADIR%%/reports/slreport.txt
X%%DATADIR%%/reports/spamreport.txt
X%%DATADIR%%/reports/virusreport.txt
X%%DATADIR%%/reports/whiteremovereport.txt
X%%DATADIR%%/reports/whitereport.txt
X%%DATADIR%%/stat.pl
X%%PORTDOCS%%%%DOCSDIR%%/Legacy - ASSP Documentation.htm
X%%PORTDOCS%%%%DOCSDIR%%/Regular Expression Tutorial.htm
X%%PORTDOCS%%@dirrm %%DOCSDIR%%
Xman/man8/assp.8.gz
Xman/man8/assplog.8.gz
X@dirrmtry %%DATADIR%%/files/files
X@dirrmtry %%DATADIR%%/reports
X@dirrmtry %%DATADIR%%/images
X@dirrmtry %%DATADIR%%/files
X@dirrmtry %%DATADIR%%/logs
X@dirrmtry %%DATADIR%%
X@dirrmtry etc/periodic/daily
X@dirrmtry etc/periodic
X@unexec rm -f %%ASSP_HOME%%/logs
X@unexec rm -f %%ASSP_HOME%%/reports
X@unexec rm -f %%ASSP_HOME%%/images
X@unexec rm -f %%ASSP_HOME%%/files
X@dirrmtry %%ASSP_HOME%%
X@unexec if [ -d %%ASSP_HOME%% ]; then echo "If you are deinstalling ASSP
completely, remove the %%ASSP_HOME%% directory."; fi
X@dirrmtry %%ASSP_LOG%%
X@unexec if [ -d %%ASSP_LOG%% ]; then echo "If you are deinstalling ASSP
completely, remove the %%ASSP_LOG%% directory."; fi
X@unexec echo "If you are deinstalling ASSP completely, delete the ASSP user
and group."
8fe14914ad0f8fb4f6a02249d845e387
exit
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to "[email protected]"