[packages/perl-Mail-SpamAssassin-SpamCopURI] raw
arekm
arekm at pld-linux.org
Mon Mar 2 11:04:16 CET 2015
commit 984c0a31496d38ac6dd907cbbe57cee671620ea2
Author: Arkadiusz Miśkiewicz <arekm at maven.pl>
Date: Mon Mar 2 11:04:03 2015 +0100
raw
perl-Mail-SpamAssassin-SpamCopURI.spec | 75 ++++++++++++++++++++++++++++++++++
1 file changed, 75 insertions(+)
---
diff --git a/perl-Mail-SpamAssassin-SpamCopURI.spec b/perl-Mail-SpamAssassin-SpamCopURI.spec
new file mode 100644
index 0000000..7b220c2
--- /dev/null
+++ b/perl-Mail-SpamAssassin-SpamCopURI.spec
@@ -0,0 +1,75 @@
+#
+# Conditional build:
+%bcond_without tests # do not perform "make test"
+#
+%define pdir Mail
+%define pnam SpamAssassin-SpamCopURI
+%include /usr/lib/rpm/macros.perl
+Summary: Mail::SpamAssassin::SpamCopURI - blacklist checking of URLs in email
+Name: perl-Mail-SpamAssassin-SpamCopURI
+Version: 0.24
+Release: 0.1
+License: GPL v1+ or Artistic
+Group: Development/Languages/Perl
+Source0: http://www.cpan.org/modules/by-module/Mail/%{pdir}-%{pnam}-%{version}.tar.gz
+# Source0-md5: 12e0f6c5f4db1d5be8d335d9b1e06be4
+URL: http://search.cpan.org/dist/Mail-SpamAssassin-SpamCopURI/
+BuildRequires: perl-devel >= 1:5.8.0
+BuildRequires: rpm-perlprov >= 4.1-13
+%if %{with tests}
+%endif
+BuildArch: noarch
+BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n)
+
+%description
+The first checks that SpamCopURI does is against the whitelist/blacklist.
+If the URL's host appears in the whitelist, then the test is an
+immediate miss. If the URL's host is in the blacklist, then the
+test is an immediate hit.
+
+This currently only checks URIs that support methods for host.
+These are typically just http, https, and ftp.
+
+If the spamcop_uri_limit is set (which it is by default)
+and the number of URLs in the message exceeds this limit,
+the URLs are shuffled and testing is done only up to the
+limit. The limit is to prevent DOS attacks, the shuffling
+is done to prevent front-loading of URLs that will fill
+the limit up with valid URLs.
+
+
+The network method tests the domain portion of the URI against
+a RHS RBL DNS rbl list that is specified in a conf file. If
+the domain appears in the RBL, then the test scores a hit.
+
+If open redirect resolution is enabled, then the url's host
+will be compared against the open_redirect_list_spamcop_uri
+and if a match is found, then the an attempt is made to
+get the Location header from the redirect service without actually
+fetching from the destination site.
+
+%prep
+%setup -q -n %{pdir}-%{pnam}-%{version}
+
+%build
+%{__perl} Makefile.PL \
+ INSTALLDIRS=vendor
+%{__make}
+
+%{?with_tests:%{__make} test}
+
+%install
+rm -rf $RPM_BUILD_ROOT
+
+%{__make} pure_install \
+ DESTDIR=$RPM_BUILD_ROOT
+
+%clean
+rm -rf $RPM_BUILD_ROOT
+
+%files
+%defattr(644,root,root,755)
+%doc Changes INSTALL README
+%{perl_vendorlib}/Mail/SpamAssassin/*.pm
+%{perl_vendorlib}/Mail/SpamAssassin/SpamCopURI
+%{_mandir}/man3/*
================================================================
---- gitweb:
http://git.pld-linux.org/gitweb.cgi/packages/perl-Mail-SpamAssassin-SpamCopURI.git/commitdiff/984c0a31496d38ac6dd907cbbe57cee671620ea2
More information about the pld-cvs-commit
mailing list