You are viewing a plain text version of this content. The canonical link for it is here.
Posted to ruleqa@spamassassin.apache.org by "Kevin A. McGrail" <KM...@PCCC.com> on 2014/11/10 18:18:06 UTC

Fwd: Output from your job 105

FYI that we published rules last night again.


-------- Forwarded Message --------
Subject: 	Output from your job 105
Date: 	Mon, 10 Nov 2014 03:08:01 +0000 (UTC)
From: 	Rule Updates Daemon <up...@spamassassin-vm.apache.org>
To: 	updatesd@spamassassin-vm.apache.org



+ '[' -d /home/updatesd/svn/spamassassin ']'
+ cd /home/updatesd/svn/spamassassin
+ . /etc/profile
++ '[' -x /usr/bin/id ']'
++ '[' -z 4474 ']'
+++ id -un
++ USER=updatesd
++ LOGNAME=updatesd
++ MAIL=/var/spool/mail/updatesd
++ '[' 4474 = 0 ']'
++ pathmunge /usr/local/sbin after
++ case ":${PATH}:" in
++ pathmunge /usr/sbin after
++ case ":${PATH}:" in
++ pathmunge /sbin after
++ case ":${PATH}:" in
+++ /bin/hostname
++ HOSTNAME=spamassassin-vm.apache.org
++ HISTSIZE=1000
++ '[' ignoredups = ignorespace ']'
++ export HISTCONTROL=ignoredups
++ HISTCONTROL=ignoredups
++ export PATH USER LOGNAME MAIL HOSTNAME HISTSIZE HISTCONTROL
++ '[' 4474 -gt 199 ']'
+++ id -gn
+++ id -un
++ '[' updatesd = updatesd ']'
++ umask 002
++ for i in '/etc/profile.d/*.sh'
++ '[' -r /etc/profile.d/colorls.sh ']'
++ '[' hxB '!=' hxB ']'
++ . /etc/profile.d/colorls.sh
++ for i in '/etc/profile.d/*.sh'
++ '[' -r /etc/profile.d/glib2.sh ']'
++ '[' hxB '!=' hxB ']'
++ . /etc/profile.d/glib2.sh
++ for i in '/etc/profile.d/*.sh'
++ '[' -r /etc/profile.d/lang.sh ']'
++ '[' hxB '!=' hxB ']'
++ . /etc/profile.d/lang.sh
++ for i in '/etc/profile.d/*.sh'
++ '[' -r /etc/profile.d/less.sh ']'
++ '[' hxB '!=' hxB ']'
++ . /etc/profile.d/less.sh
++ for i in '/etc/profile.d/*.sh'
++ '[' -r /etc/profile.d/vim.sh ']'
++ '[' hxB '!=' hxB ']'
++ . /etc/profile.d/vim.sh
++ for i in '/etc/profile.d/*.sh'
++ '[' -r /etc/profile.d/which2.sh ']'
++ '[' hxB '!=' hxB ']'
++ . /etc/profile.d/which2.sh
++ unset i
++ unset -f pathmunge
+ PERL=/local/perl586/bin/perl
+ export PERL
+ soadir=/var/named/spamassassin.org.d
+ '[' 0 -gt 0 ']'
+ umask 002
++ cat /var/named/spamassassin.org.d/counter
+ oldcount=0
+ perl -e 'use Time::Local; @t=localtime; $mn=timelocal 0,0,0,@t[3..6]; ($mtime) = (stat("/var/named/spamassassin.org.d/counter"))[9]; exit($mn<=$mtime);'
+ oldcount=-1
++ perl -e '

   my $count = (($ARGV[0] + 1) % 100);
   my @t = localtime time;
   printf "%04d%02d%02d%02d", $t[5]+1900, $t[4]+1, $t[3], $count;

   open (INCR, ">/var/named/spamassassin.org.d/counter") or die "open failed /var/named/spamassassin.org.d";
   print INCR $count,"\n"; close INCR or die "close failed /var/named/spamassassin.org.d";

' -- -1
+ newserial=2014111000
+ soafile=/var/named/spamassassin.org.d/soa_line
+ rm -f /var/named/spamassassin.org.d/soa_line.bak /var/named/spamassassin.org.d/soa_line.new
+ touch /var/named/spamassassin.org.d/soa_line
+ sed -e s/__SERIAL__/2014111000/
+ '[' -s /var/named/spamassassin.org.d/soa_line.new ']'
+ mv /var/named/spamassassin.org.d/soa_line /var/named/spamassassin.org.d/soa_line.bak
+ mv /var/named/spamassassin.org.d/soa_line.new /var/named/spamassassin.org.d/soa_line
+ true
+ sudo rndc reload
server reload successful
+ exit 0