aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authormiwi <miwi@FreeBSD.org>2008-11-30 05:02:39 +0800
committermiwi <miwi@FreeBSD.org>2008-11-30 05:02:39 +0800
commit867bbd8e691d6c29484d767e3ecb666a6b581f69 (patch)
treeaeabce518dcadff95a9310c394f18b5960bb624c
parentc2e866d79747160fae837d1881e8340c1837df38 (diff)
downloadfreebsd-ports-gnome-867bbd8e691d6c29484d767e3ecb666a6b581f69.tar.gz
freebsd-ports-gnome-867bbd8e691d6c29484d767e3ecb666a6b581f69.tar.zst
freebsd-ports-gnome-867bbd8e691d6c29484d767e3ecb666a6b581f69.zip
ACL Policy Daemon is a program that communicates with the Postfix MTA using the
Policy Delegation Protocol implementing an ACL (Access Control List) system, making very easy to improve and create nice controls on your e-mail traffic. You can use it to verify SPF records too. WWW: http://www.apolicy.org PR: ports/129162 Submitted by: Chifeng QU <chifeng at gmail.com>
-rw-r--r--mail/Makefile1
-rw-r--r--mail/py-apolicy/Makefile35
-rw-r--r--mail/py-apolicy/distinfo3
-rw-r--r--mail/py-apolicy/files/apolicyd.in35
-rw-r--r--mail/py-apolicy/files/patch-setup.py8
-rw-r--r--mail/py-apolicy/files/patch-z20
-rw-r--r--mail/py-apolicy/files/pkg-message.in8
-rw-r--r--mail/py-apolicy/pkg-descr6
-rw-r--r--mail/py-apolicy/pkg-plist19
9 files changed, 135 insertions, 0 deletions
diff --git a/mail/Makefile b/mail/Makefile
index b612a473af2b..69dbe767d65a 100644
--- a/mail/Makefile
+++ b/mail/Makefile
@@ -494,6 +494,7 @@
SUBDIR += prom-wl
SUBDIR += pronto
SUBDIR += proxsmtp
+ SUBDIR += py-apolicy
SUBDIR += py-cyruslib
SUBDIR += py-email
SUBDIR += py-libgmail
diff --git a/mail/py-apolicy/Makefile b/mail/py-apolicy/Makefile
new file mode 100644
index 000000000000..cb0dc5d5b7c9
--- /dev/null
+++ b/mail/py-apolicy/Makefile
@@ -0,0 +1,35 @@
+# New ports collection makefile for: py-apolicy
+# Date created: 24 November 2008
+# Whom: Chifeng QU <chifeng@gmail.com>
+#
+# $FreeBSD$
+#
+
+PORTNAME= apolicy
+PORTVERSION= 0.73
+CATEGORIES= mail python
+MASTER_SITES= http://download.gna.org/apolicy/%SUBDIR%/ \
+ http://www.chifeng.name/dist/apolicy/%SUBDIR%/ \
+
+PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
+
+MAINTAINER?= chifeng@gmail.com
+COMMENT= An ACL system for Postfix, as a policy daemon
+
+RUN_DEPENDS= ${PYTHON_SITELIBDIR}/spf.py:${PORTSDIR}/mail/py-spf \
+ ${PYTHON_SITELIBDIR}/IPy.py:${PORTSDIR}/net-mgmt/py-ipy
+
+USE_PYTHON= 2.3+
+USE_PYDISTUTILS=yes
+USE_TWISTED= yes
+NO_BUILD= yes
+USE_RC_SUBR= apolicyd
+
+SUB_LIST= PYTHON_SITELIBDIR=${PYTHON_SITELIBDIR} \
+ PYTHON_CMD=${PYTHON_CMD}
+SUB_FILES= pkg-message
+
+post-install:
+ @${CAT} ${PKGMESSAGE}
+
+.include <bsd.port.mk>
diff --git a/mail/py-apolicy/distinfo b/mail/py-apolicy/distinfo
new file mode 100644
index 000000000000..9f9dbfaecf4f
--- /dev/null
+++ b/mail/py-apolicy/distinfo
@@ -0,0 +1,3 @@
+MD5 (apolicy-0.73.tar.gz) = 40712afda421e65dccd371bf8dcc3229
+SHA256 (apolicy-0.73.tar.gz) = b186464f9dda14ea9cf638c622a75bb2b7d5d8281ebc64ef334fe4dee883d2f7
+SIZE (apolicy-0.73.tar.gz) = 32773
diff --git a/mail/py-apolicy/files/apolicyd.in b/mail/py-apolicy/files/apolicyd.in
new file mode 100644
index 000000000000..07cf41bc9648
--- /dev/null
+++ b/mail/py-apolicy/files/apolicyd.in
@@ -0,0 +1,35 @@
+#!/bin/sh
+
+# Start or stop apolicyd
+# $FreeBSD$
+
+# PROVIDE: apolicyd
+# REQUIRE: TWISTD
+# KEYWORD: shutdown
+#
+prefix=%%PREFIX%%
+
+# Define these apolicyd_* variables in one of these files:
+# /etc/rc.conf
+# /etc/rc.conf.local
+#
+# DO NOT CHANGE THESE DEFAULT VALUES HERE
+#
+
+. %%RC_SUBR%%
+
+name="apolicyd"
+rcvar=`set_rcvar`
+
+command="%%LOCALBASE%%/bin/twistd"
+pidfile="/var/run/apolicyd.pid"
+logfile="/var/log/apolicyd.log"
+
+load_rc_config $name
+
+: ${apolicyd_enable="NO"}
+
+command_args="--pidfile=${pidfile} -y %%PYTHON_SITELIBDIR%%/apolicy/server.py -q --logfile=${logfile} 2>&1 >/dev/null"
+procname="%%PYTHON_CMD%%"
+
+run_rc_command "$1"
diff --git a/mail/py-apolicy/files/patch-setup.py b/mail/py-apolicy/files/patch-setup.py
new file mode 100644
index 000000000000..0fa976f3dbe5
--- /dev/null
+++ b/mail/py-apolicy/files/patch-setup.py
@@ -0,0 +1,8 @@
+--- setup.py.orig 2008-11-24 06:35:54.000000000 +0000
++++ setup.py 2008-11-24 06:36:11.000000000 +0000
+@@ -28,4 +28,4 @@
+ author_email="miguel.filho@gmail.com", packages=["apolicy"],
+ package_dir={"apolicy": "src/apolicy"},
+ url="http://www.apolicy.org",
+- data_files=[("/etc/apolicy", data_files)])
++ data_files=[("/usr/local/etc/apolicy", data_files)])
diff --git a/mail/py-apolicy/files/patch-z b/mail/py-apolicy/files/patch-z
new file mode 100644
index 000000000000..c602065d8945
--- /dev/null
+++ b/mail/py-apolicy/files/patch-z
@@ -0,0 +1,20 @@
+--- src/apolicy/config.py.orig 2008-11-24 07:53:32.000000000 +0000
++++ src/apolicy/config.py 2008-11-24 07:53:53.000000000 +0000
+@@ -22,7 +22,7 @@
+ import pwd
+ from ConfigParser import ConfigParser
+
+-config_path = "/etc/apolicy/main.conf"
++config_path = "/usr/local/etc/apolicy/main.conf"
+
+ if "APOLICY_CONFIG_PATH" in os.environ:
+ config_path = os.environ["APOLICY_CONFIG_PATH"]
+@@ -42,7 +42,7 @@
+ config.set("main", "timeout", "5")
+
+ if not config.has_option("main", "policy_path"):
+- config.set("main", "policy_path", "/etc/apolicy/policy.conf")
++ config.set("main", "policy_path", "/usr/local/etc/apolicy/policy.conf")
+
+ user = pwd.getpwnam(config.get("main", "user"))
+ config.set("main", "uid", str(user[2]))
diff --git a/mail/py-apolicy/files/pkg-message.in b/mail/py-apolicy/files/pkg-message.in
new file mode 100644
index 000000000000..21c1337e9ae9
--- /dev/null
+++ b/mail/py-apolicy/files/pkg-message.in
@@ -0,0 +1,8 @@
+To use this from Postfix SMTPD, use in %%PREFIX%%/etc/postfix/main.cf:
+
+smtpd_recipient_restrictions = ...
+ check_policy_service inet:127.0.0.1:10001
+ ...
+
+NOTE: specify check_policy_service AFTER reject_unauth_destination
+or else your system can become an open relay.
diff --git a/mail/py-apolicy/pkg-descr b/mail/py-apolicy/pkg-descr
new file mode 100644
index 000000000000..d243a5bc052f
--- /dev/null
+++ b/mail/py-apolicy/pkg-descr
@@ -0,0 +1,6 @@
+ACL Policy Daemon is a program that communicates with the Postfix MTA using the
+Policy Delegation Protocol implementing an ACL (Access Control List) system,
+making very easy to improve and create nice controls on your e-mail traffic.
+You can use it to verify SPF records too.
+
+WWW: http://www.apolicy.org
diff --git a/mail/py-apolicy/pkg-plist b/mail/py-apolicy/pkg-plist
new file mode 100644
index 000000000000..c39f9ffc3758
--- /dev/null
+++ b/mail/py-apolicy/pkg-plist
@@ -0,0 +1,19 @@
+%%PYTHON_SITELIBDIR%%/apolicy/__init__.py
+%%PYTHON_SITELIBDIR%%/apolicy/__init__.pyc
+%%PYTHON_SITELIBDIR%%/apolicy/__init__.pyo
+%%PYTHON_SITELIBDIR%%/apolicy/base.py
+%%PYTHON_SITELIBDIR%%/apolicy/base.pyc
+%%PYTHON_SITELIBDIR%%/apolicy/base.pyo
+%%PYTHON_SITELIBDIR%%/apolicy/config.py
+%%PYTHON_SITELIBDIR%%/apolicy/config.pyc
+%%PYTHON_SITELIBDIR%%/apolicy/config.pyo
+%%PYTHON_SITELIBDIR%%/apolicy/parser.py
+%%PYTHON_SITELIBDIR%%/apolicy/parser.pyc
+%%PYTHON_SITELIBDIR%%/apolicy/parser.pyo
+%%PYTHON_SITELIBDIR%%/apolicy/server.py
+%%PYTHON_SITELIBDIR%%/apolicy/server.pyc
+%%PYTHON_SITELIBDIR%%/apolicy/server.pyo
+@dirrm %%PYTHON_SITELIBDIR%%/apolicy
+etc/apolicy/main.conf
+etc/apolicy/policy.conf
+@dirrmtry etc/apolicy