You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@spamassassin.apache.org by fe...@apache.org on 2006/12/07 23:03:38 UTC

svn commit: r483692 - in /spamassassin/rules/trunk/sandbox/felicity: 70_other.cf sandbox-felicity.pm

Author: felicity
Date: Thu Dec  7 14:03:37 2006
New Revision: 483692

URL: http://svn.apache.org/viewvc?view=rev&rev=483692
Log:
uncomment some test rules, fix plugin test results

Modified:
    spamassassin/rules/trunk/sandbox/felicity/70_other.cf
    spamassassin/rules/trunk/sandbox/felicity/sandbox-felicity.pm

Modified: spamassassin/rules/trunk/sandbox/felicity/70_other.cf
URL: http://svn.apache.org/viewvc/spamassassin/rules/trunk/sandbox/felicity/70_other.cf?view=diff&rev=483692&r1=483691&r2=483692
==============================================================================
--- spamassassin/rules/trunk/sandbox/felicity/70_other.cf (original)
+++ spamassassin/rules/trunk/sandbox/felicity/70_other.cf Thu Dec  7 14:03:37 2006
@@ -316,7 +316,7 @@
 # bug 4459: allow 127.0.0.\d+, and look for other illegals
 # jm: commented, lint failures in bbmass
 # http://bbmass.spamassassin.org:8011/mc-fast/builds/0/test/0
-# ifplugin Mail::SpamAssassin::Plugin::RelayEval
-# header RCVD_ILLEGAL_IP2         eval:check_for_illegal_ip2()
-# header RCVD_ILLEGAL_IP3         eval:check_for_illegal_ip3()
-# endif
+ifplugin Mail::SpamAssassin::Plugin::RelayEval
+header RCVD_ILLEGAL_IP2         eval:check_for_illegal_ip2()
+header RCVD_ILLEGAL_IP3         eval:check_for_illegal_ip3()
+endif

Modified: spamassassin/rules/trunk/sandbox/felicity/sandbox-felicity.pm
URL: http://svn.apache.org/viewvc/spamassassin/rules/trunk/sandbox/felicity/sandbox-felicity.pm?view=diff&rev=483692&r1=483691&r2=483692
==============================================================================
--- spamassassin/rules/trunk/sandbox/felicity/sandbox-felicity.pm (original)
+++ spamassassin/rules/trunk/sandbox/felicity/sandbox-felicity.pm Thu Dec  7 14:03:37 2006
@@ -54,7 +54,7 @@
     $pms->{base64_length} = $self->_check_base64_length($pms->{msg});
   }
 
-  return $pms->{base64_length} <= $max if defined $max;
+  return 0 if (defined $max && $pms->{base64_length} > $max);
   return $pms->{base64_length} >= $min;
 }