--- /dev/null
+#
+# Copyright (C) 2006-2008 OpenWrt.org
+#
+# This is free software, licensed under the GNU General Public License v2.
+# See /LICENSE for more information.
+#
+# $Id$
+
+include $(TOPDIR)/rules.mk
+
+PKG_NAME:=dovecot
+PKG_VERSION:=1.0.beta8
+PKG_RELEASE:=1
+
+PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
+PKG_SOURCE_URL:=http://www.dovecot.org/releases/
+PKG_MD5SUM:=6a87718a86ee1ae2334c75843dd9a7df
+
+include $(INCLUDE_DIR)/package.mk
+
+define Package/dovecot
+ SECTION:=mail
+ CATEGORY:=Mail
+ DEPENDS:=+libopenssl
+ TITLE:=An IMAP and POP3 daemon
+ URL:=http://www.dovecot.org/
+endef
+
+define Package/dovecot/description
+ Dovecot is a program which provides POP3 and IMAP services.
+endef
+
+define Build/Configure
+ (cd $(PKG_BUILD_DIR); rm -rf config.{cache,status}; \
+ autoconf \
+ );
+ $(call Build/Configure/Default, \
+ --without-gssapi \
+ --with-moduledir=/usr/lib/dovecot/modules \
+ , \
+ ignore_signed_size=1 \
+ )
+endef
+
+define Build/Compile
+ $(MAKE) -C $(PKG_BUILD_DIR) \
+ DESTDIR="$(PKG_INSTALL_DIR)" \
+ all install
+endef
+
+define Package/dovecot/install
+ $(INSTALL_DIR) $(1)/etc/init.d
+ $(INSTALL_BIN) ./files/dovecot.init $(1)/etc/init.d/dovecot
+ $(INSTALL_DIR) $(1)/etc/dovecot
+ $(INSTALL_DATA) ./files/dovecot.conf $(1)/etc/dovecot.conf
+ $(INSTALL_DIR) $(1)/usr/lib/dovecot
+ $(CP) $(PKG_INSTALL_DIR)/usr/lib/dovecot/* $(1)/usr/lib/dovecot/
+ $(INSTALL_DIR) $(1)/usr/sbin
+ $(INSTALL_BIN) $(PKG_INSTALL_DIR)/usr/sbin/* $(1)/usr/sbin/
+ find $(1)/usr/lib/dovecot/modules/ \
+ -name "*.a" -o -name "*.la" | xargs rm
+endef
+
+define Package/dovecot/conffiles
+/etc/dovecot.conf
+endef
+
+define Package/dovecot/postinst
+#!/bin/sh
+
+id=59
+name=dovecot
+home=/var/run/dovecot
+shell=/bin/false
+
+# do not change below
+# check if we are on real system
+if [ -z "$${IPKG_INSTROOT}" ]; then
+ # create copies of passwd and group, if we use squashfs
+ rootfs=`mount |awk '/root/ { print $$5 }'`
+ if [ "$$rootfs" = "squashfs" ]; then
+ if [ -h /etc/group ]; then
+ rm /etc/group
+ cp -p /rom/etc/group /etc/group
+ fi
+ if [ -h /etc/passwd ]; then
+ rm /etc/passwd
+ cp -p /rom/etc/passwd /etc/passwd
+ fi
+ fi
+fi
+
+echo ""
+if [ -z "$$(grep ^\\$${name}: $${IPKG_INSTROOT}/etc/group)" ]; then
+ echo "adding group $$name to /etc/group"
+ echo "$${name}:x:$${id}:" >> $${IPKG_INSTROOT}/etc/group
+fi
+if [ -z "$$(grep ^\\$${name}: $${IPKG_INSTROOT}/etc/passwd)" ]; then
+ echo "adding user $$name to /etc/passwd"
+ echo "$${name}:x:$${id}:$${id}:$${name}:$${home}:$${shell}" >> $${IPKG_INSTROOT}/etc/passwd
+fi
+endef
+
+
+$(eval $(call BuildPackage,dovecot))
+
+$(eval $(call RequireCommand,autoconf, \
+ $(PKG_NAME) requires GNU autoconf. \
+))
--- /dev/null
+## Dovecot configuration file
+
+# '#' character and everything after it is treated as comments. Extra spaces
+# and tabs are ignored. If you want to use either of these explicitly, put the
+# value inside quotes, eg.: key = "# char and trailing whitespace "
+
+# Default values are shown after each value, it's not required to uncomment
+# any of the lines. Exception to this are paths, they're just examples
+# with real defaults being based on configure options. The paths listed here
+# are for configure --prefix=/usr --sysconfdir=/etc --localstatedir=/var
+# --with-ssldir=/etc/ssl
+
+# Base directory where to store runtime data.
+#base_dir = /var/run/dovecot/
+
+# Protocols we want to be serving:
+# imap imaps pop3 pop3s
+#protocols = imap imaps
+protocols = imap
+
+# IP or host address where to listen in for connections. It's not currently
+# possible to specify multiple addresses. "*" listens in all IPv4 interfaces.
+# "[::]" listens in all IPv6 interfaces, but may also listen in all IPv4
+# interfaces depending on the operating system. If you want to specify ports
+# for each service, you will need to configure these settings inside the
+# protocol imap/pop3 { ... } section, so you can specify different ports
+# for IMAP/POP3.
+#listen = *
+
+# IP or host address where to listen in for SSL connections. Defaults
+# to above if not specified.
+#ssl_listen =
+
+# Disable SSL/TLS support.
+#ssl_disable = no
+ssl_disable = yes
+
+# PEM encoded X.509 SSL/TLS certificate and private key. They're opened before
+# dropping root privileges, so keep the key file unreadable by anyone but
+# root.
+#ssl_cert_file = /etc/ssl/certs/ssl-cert-snakeoil.pem
+#ssl_key_file = /etc/ssl/private/ssl-cert-snakeoil.key
+
+# If key file is password protected, give the password here. Alternatively
+# give it when starting dovecot with -p parameter.
+#ssl_key_password =
+
+# File containing trusted SSL certificate authorities. Usually not needed.
+#ssl_ca_file =
+
+# Request client to send a certificate.
+#ssl_verify_client_cert = no
+
+# How often to regenerate the SSL parameters file. Generation is quite CPU
+# intensive operation. The value is in hours, 0 disables regeneration
+# entirely.
+#ssl_parameters_regenerate = 168
+
+# SSL ciphers to use
+#ssl_cipher_list = ALL:!LOW
+
+# Disable LOGIN command and all other plaintext authentications unless
+# SSL/TLS is used (LOGINDISABLED capability). Note that 127.*.*.* and
+# IPv6 ::1 addresses are considered secure, this setting has no effect if
+# you connect from those addresses.
+disable_plaintext_auth = no
+
+# Use this logfile instead of syslog(). /dev/stderr can be used if you want to
+# use stderr for logging (ONLY /dev/stderr - otherwise it is closed).
+#log_path =
+
+# For informational messages, use this logfile instead of the default
+#info_log_path =
+
+# Prefix for each line written to log file. % codes are in strftime(3)
+# format.
+log_timestamp = "%Y-%m-%d %H:%M:%S "
+
+# Syslog facility to use if you're logging to syslog. Usually if you don't
+# want to use "mail", you'll use local0..local7. Also other standard
+# facilities are supported.
+#syslog_facility = mail
+
+##
+## Login processes
+##
+
+# Directory where authentication process places authentication UNIX sockets
+# which login needs to be able to connect to. The sockets are created when
+# running as root, so you don't have to worry about permissions. Note that
+# everything in this directory is deleted when Dovecot is started.
+#login_dir = /var/run/dovecot/login
+
+# chroot login process to the login_dir. Only reason not to do this is if you
+# wish to run the whole Dovecot without roots.
+# http://wiki.dovecot.org/Rootless
+#login_chroot = yes
+
+# User to use for the login process. Create a completely new user for this,
+# and don't use it anywhere else. The user must also belong to a group where
+# only it has access, it's used to control access for authentication process.
+# Note that this user is NOT used to access mails.
+# http://wiki.dovecot.org/UserIds
+#login_user = dovecot
+
+# Set max. process size in megabytes. If you don't use
+# login_process_per_connection you might need to grow this.
+#login_process_size = 32
+
+# Should each login be processed in it's own process (yes), or should one
+# login process be allowed to process multiple connections (no)? Yes is more
+# secure, espcially with SSL/TLS enabled. No is faster since there's no need
+# to create processes all the time.
+#login_process_per_connection = yes
+
+# Number of login processes to create. If login_process_per_connection is
+# yes, this is the number of extra processes waiting for users to log in.
+#login_processes_count = 3
+
+# Maximum number of extra login processes to create. The extra process count
+# usually stays at login_processes_count, but when multiple users start logging
+# in at the same time more extra processes are created. To prevent fork-bombing
+# we check only once in a second if new processes should be created - if all
+# of them are used at the time, we double their amount until limit set by this
+# setting is reached. This setting is used only if login_process_per_use is yes.
+#login_max_processes_count = 128
+
+# Maximum number of connections allowed in login state. When this limit is
+# reached, the oldest connections are dropped. If login_process_per_connection
+# is no, this is a per-process value, so the absolute maximum number of users
+# logging in actually login_processes_count * max_logging_users.
+#login_max_logging_users = 256
+
+# Greeting message for clients.
+#login_greeting = Dovecot ready.
+
+# Space-separated list of elements we want to log. The elements which have
+# a non-empty variable value are joined together to form a comma-separated
+# string.
+#login_log_format_elements = user=<%u> method=%m rip=%r lip=%l %c
+
+# Login log format. %$ contains login_log_format_elements string, %s contains
+# the data we want to log.
+#login_log_format = %$: %s
+
+##
+## Mail processes
+##
+
+# Maximum number of running mail processes. When this limit is reached,
+# new users aren't allowed to log in.
+#max_mail_processes = 1024
+
+# Show more verbose process titles (in ps). Currently shows user name and
+# IP address. Useful for seeing who are actually using the IMAP processes
+# (eg. shared mailboxes or if same uid is used for multiple accounts).
+#verbose_proctitle = no
+
+# Show protocol level SSL errors.
+#verbose_ssl = no
+
+# Valid UID range for users, defaults to 500 and above. This is mostly
+# to make sure that users can't log in as daemons or other system users.
+# Note that denying root logins is hardcoded to dovecot binary and can't
+# be done even if first_valid_uid is set to 0.
+#first_valid_uid = 500
+#last_valid_uid = 0
+
+# Valid GID range for users, defaults to non-root/wheel. Users having
+# non-valid GID as primary group ID aren't allowed to log in. If user
+# belongs to supplementary groups with non-valid GIDs, those groups are
+# not set.
+#first_valid_gid = 1
+#last_valid_gid = 0
+
+# Grant access to these extra groups for mail processes. Typical use would be
+# to give "mail" group write access to /var/mail to be able to create dotlocks.
+mail_extra_groups = mail
+
+# ':' separated list of directories under which chrooting is allowed for mail
+# processes (ie. /var/mail will allow chrooting to /var/mail/foo/bar too).
+# This setting doesn't affect login_chroot or auth_chroot variables.
+# WARNING: Never add directories here which local users can modify, that
+# may lead to root exploit. Usually this should be done only if you don't
+# allow shell access for users. See
+# /usr/share/doc/dovecot-common/configuration.txt for more information.
+#valid_chroot_dirs =
+
+# Default chroot directory for mail processes. This can be overridden for
+# specific users in user database by giving /./ in user's home directory
+# (eg. /home/./user chroots into /home). Note that usually there is no real
+# need to do chrooting, Dovecot doesn't allow users to access files outside
+# their mail directory anyway.
+#mail_chroot =
+
+# Enable mail process debugging. This can help you figure out why Dovecot
+# isn't finding your mails.
+#mail_debug = no
+
+# Default MAIL environment to use when it's not set. By leaving this empty
+# dovecot tries to do some automatic detection as described in
+# /usr/share/doc/dovecot-common/mail-storages.txt. There's a few special
+# variables you can use, eg.:
+#
+# %u - username
+# %n - user part in user@domain, same as %u if there's no domain
+# %d - domain part in user@domain, empty if there's no domain
+# %h - home directory
+#
+# See /usr/share/doc/dovecot-common/variables.txt for full list. Some examples:
+#
+# default_mail_env = maildir:/var/mail/%1u/%u/Maildir
+# default_mail_env = mbox:~/mail/:INBOX=/var/mail/%u
+# default_mail_env = mbox:/var/mail/%d/%n/:INDEX=/var/indexes/%d/%n
+#
+#default_mail_env =
+
+# If you need to set multiple mailbox locations or want to change default
+# namespace settings, you can do it by defining namespace sections:
+#
+# You can have private, shared and public namespaces. The only difference
+# between them is how Dovecot announces them to client via NAMESPACE
+# extension. Shared namespaces are meant for user-owned mailboxes which are
+# shared to other users, while public namespaces are for more globally
+# accessible mailboxes.
+#
+# REMEMBER: If you add any namespaces, the default namespace must be added
+# explicitly, ie. default_mail_env does nothing unless you have a namespace
+# without a location setting. Default namespace is simply done by having a
+# namespace with empty prefix.
+#namespace private {
+ # Hierarchy separator to use. You should use the same separator for all
+ # namespaces or some clients get confused. '/' is usually a good one.
+ #separator = /
+
+ # Prefix required to access this namespace. This needs to be different for
+ # all namespaces. For example "Public/".
+ #prefix =
+
+ # Physical location of the mailbox. This is in same format as
+ # default_mail_env, which is also the default for it.
+ #location =
+
+ # There can be only one INBOX, and this setting defines which namespace
+ # has it.
+ #inbox = yes
+
+ # If namespace is hidden, it's not advertised to clients via NAMESPACE
+ # extension or shown in LIST replies. This is mostly useful when converting
+ # from another server with different namespaces which you want to depricate
+ # but still keep working. For example you can create hidden namespaces with
+ # prefixes "~/mail/", "~%u/mail/" and "mail/".
+ #hidden = yes
+#}
+
+# Space-separated list of fields to initially save into cache file. Currently
+# these fields are allowed:
+#
+# flags, date.sent, date.received, size.virtual, size.physical
+# mime.parts, imap.body, imap.bodystructure
+#
+# Different IMAP clients work in different ways, so they benefit from
+# different cached fields. Some do not benefit from them at all. Caching more
+# than necessary generates useless disk I/O, so you don't want to do that
+# either.
+#
+# Dovecot attempts to automatically figure out what client wants and it keeps
+# only that. However the first few times a mailbox is opened, Dovecot hasn't
+# yet figured out what client needs, so it may not perform optimally. If you
+# know what fields the majority of your clients need, it may be useful to set
+# these fields by hand. If client doesn't actually use them, Dovecot will
+# eventually drop them.
+#
+# Usually you should just leave this field alone. The potential benefits are
+# typically unnoticeable.
+#mail_cache_fields =
+
+# Space-separated list of fields that Dovecot should never save to cache file.
+# Useful if you want to save disk space at the cost of more I/O when the fields
+# needed.
+#mail_never_cache_fields =
+
+# The minimum number of mails in a mailbox before updates are done to cache
+# file. This allows optimizing Dovecot's behavior to do less disk writes at
+# the cost of more disk reads.
+#mail_cache_min_mail_count = 0
+
+# When IDLE command is running, mailbox is checked once in a while to see if
+# there are any new mails or other changes. This setting defines the minimum
+# time to wait between those checks. Dovecot is however able to use dnotify
+# and inotify with Linux to reply immediately after the change occurs.
+#mailbox_idle_check_interval = 30
+
+# Allow full filesystem access to clients. There's no access checks other than
+# what the operating system does for the active UID/GID. It works with both
+# maildir and mboxes, allowing you to prefix mailboxes names with eg. /path/
+# or ~user/.
+#mail_full_filesystem_access = no
+
+# Maximum allowed length for mail keyword name. It's only forced when trying
+# to create new keywords.
+#mail_max_keyword_length = 50
+
+# Save mails with CR+LF instead of plain LF. This makes sending those mails
+# take less CPU, especially with sendfile() syscall with Linux and FreeBSD.
+# But it also creates a bit more disk I/O which may just make it slower.
+# Also note that if other software reads the mboxes/maildirs, they may handle
+# the extra CRs wrong and cause problems.
+#mail_save_crlf = no
+
+# Use mmap() instead of read() to read mail files. read() seems to be a bit
+# faster with my Linux/x86 and it's better with NFS, so that's the default.
+# Note that OpenBSD 3.3 and older don't work right with mail_read_mmaped = yes.
+#mail_read_mmaped = no
+
+# Don't use mmap() at all. This is required if you store indexes in remote
+# filesystems (NFS or clustered filesystem).
+#mmap_disable = no
+
+# Don't write() to mmaped files. This is required for some operating systems
+# which use separate caches for them, such as OpenBSD.
+#mmap_no_write = no
+
+# Locking method for index files. Alternatives are fcntl, flock and dotlock.
+# Dotlocking uses some tricks which may create more disk I/O than other locking
+# methods. NOTE: If you use NFS, remember to change also mmap_disable setting!
+# Solaris doesn't support flock, so Solaris users need to change this to fcntl.
+#lock_method = flock
+
+# By default LIST command returns all entries in maildir beginning with dot.
+# Enabling this option makes Dovecot return only entries which are directories.
+# This is done by stat()ing each entry, so it causes more disk I/O.
+# (For systems setting struct dirent->d_type, this check is free and it's
+# done always regardless of this setting)
+#maildir_stat_dirs = no
+
+# Copy mail to another folders using hard links. This is much faster than
+# actually copying the file. This is problematic only if something modifies
+# the mail in one folder but doesn't want it modified in the others. I don't
+# know any MUA which would modify mail files directly. IMAP protocol also
+# requires that the mails don't change, so it would be problematic in any case.
+# If you care about performance, enable it.
+#maildir_copy_with_hardlinks = no
+
+# Which locking methods to use for locking mbox. There's four available:
+# dotlock: Create <mailbox>.lock file. This is the oldest and most NFS-safe
+# solution. If you want to use /var/mail/ like directory, the users
+# will need write access to that directory.
+# fcntl : Use this if possible. Works with NFS too if lockd is used.
+# flock : May not exist in all systems. Doesn't work with NFS.
+# lockf : May not exist in all systems. Doesn't work with NFS.
+#
+# You can use multiple locking methods; if you do the order they're declared
+# in is important to avoid deadlocks if other MTAs/MUAs are using multiple
+# locking methods as well. Some operating systems don't allow using some of
+# them simultaneously.
+#mbox_read_locks = fcntl
+#mbox_write_locks = dotlock fcntl
+
+# Maximum time in seconds to wait for lock (all of them) before aborting.
+#mbox_lock_timeout = 300
+
+# If dotlock exists but the mailbox isn't modified in any way, override the
+# lock file after this many seconds.
+#mbox_dotlock_change_timeout = 30
+
+# When mbox changes unexpectedly we have to fully read it to find out what
+# changed. If the mbox is large this can take a long time. Since the change
+# is usually just a newly appended mail, it'd be faster to simply read the
+# new mails. If this setting is enabled, Dovecot does this but still safely
+# fallbacks to re-reading the whole mbox file whenever something in mbox isn't
+# how it's expected to be. The only real downside to this setting is that if
+# some other MUA changes message flags, Dovecot doesn't notice it immediately.
+# Note that a full sync is done with SELECT, EXAMINE, EXPUNGE and CHECK
+# commands.
+#mbox_dirty_syncs = yes
+
+# Like mbox_dirty_syncs, but don't do full syncs even with SELECT, EXAMINE,
+# EXPUNGE or CHECK commands. If this is set, mbox_dirty_syncs is ignored.
+#mbox_very_dirty_syncs = no
+
+# Delay writing mbox headers until doing a full write sync (EXPUNGE and CHECK
+# commands and when closing the mailbox). This is especially useful for POP3
+# where clients often delete all mails. The downside is that our changes
+# aren't immediately visible to other MUAs.
+#mbox_lazy_writes = yes
+
+# If mbox size is smaller than this (in kilobytes), don't write index files.
+# If an index file already exists it's still read, just not updated.
+#mbox_min_index_size = 0
+
+# Maximum dbox file size in kilobytes until it's rotated.
+#dbox_rotate_size = 2048
+
+# Minimum dbox file size in kilobytes before it's rotated
+# (overrides dbox_rotate_days)
+#dbox_rotate_min_size = 16
+
+# Maximum dbox file age in days until it's rotated. Day always begins from
+# midnight, so 1 = today, 2 = yesterday, etc. 0 = check disabled.
+#dbox_rotate_days = 0
+
+# umask to use for mail files and directories
+#umask = 0077
+
+# Drop all privileges before exec()ing the mail process. This is mostly
+# meant for debugging, otherwise you don't get core dumps. It could be a small
+# security risk if you use single UID for multiple users, as the users could
+# ptrace() each others processes then.
+#mail_drop_priv_before_exec = no
+
+# Set max. process size in megabytes. Most of the memory goes to mmap()ing
+# files, so it shouldn't harm much even if this limit is set pretty high.
+#mail_process_size = 256
+
+# Log prefix for mail processes. See
+# /usr/share/doc/dovecot-common/variables.txt for list of possible variables
+#you can use.
+#mail_log_prefix = "%Us(%u): "
+
+##
+## IMAP specific settings
+##
+
+protocol imap {
+ # Login executable location.
+ #login_executable = /usr/lib/dovecot/imap-login
+
+ # IMAP executable location. Changing this allows you to execute other
+ # binaries before the imap process is executed.
+ #
+ # This would write rawlogs into ~/dovecot.rawlog/ directory:
+ # mail_executable = /usr/lib/dovecot/rawlog /usr/lib/dovecot/imap
+ #
+ # This would attach gdb into the imap process and write backtraces into
+ # /tmp/gdbhelper.* files:
+ # mail_executable = /usr/lib/dovecot/gdbhelper /usr/lib/dovecot/imap
+ #
+ #mail_executable = /usr/lib/dovecot/imap
+
+ # Maximum IMAP command line length in bytes. Some clients generate very long
+ # command lines with huge mailboxes, so you may need to raise this if you get
+ # "Too long argument" or "IMAP command line too large" errors often.
+ #imap_max_line_length = 65536
+
+ # Support for dynamically loadable modules.
+ #mail_use_modules = no
+ #mail_modules = /usr/lib/dovecot/modules/imap
+
+ # Send IMAP capabilities in greeting message. This makes it unnecessary for
+ # clients to request it with CAPABILITY command, so it saves one round-trip.
+ # Many clients however don't understand it and ask the CAPABILITY anyway.
+ #login_greeting_capability = no
+
+ # Workarounds for various client bugs:
+ # delay-newmail:
+ # Send EXISTS/RECENT new mail notifications only when replying to NOOP
+ # and CHECK commands. Some clients ignore them otherwise, for example
+ # OSX Mail. Outlook Express breaks more badly though, without this it
+ # may show user "Message no longer in server" errors. Note that OE6 still
+ # breaks even with this workaround if synchronization is set to
+ # "Headers Only".
+ # outlook-idle:
+ # Outlook and Outlook Express never abort IDLE command, so if no mail
+ # arrives in half a hour, Dovecot closes the connection. This is still
+ # fine, except Outlook doesn't connect back so you don't see if new mail
+ # arrives.
+ # netscape-eoh:
+ # Netscape 4.x breaks if message headers don't end with the empty "end of
+ # headers" line. Normally all messages have this, but setting this
+ # workaround makes sure that Netscape never breaks by adding the line if
+ # it doesn't exist. This is done only for FETCH BODY[HEADER.FIELDS..]
+ # commands. Note that RFC says this shouldn't be done.
+ # tb-extra-mailbox-sep:
+ # With mbox storage a mailbox can contain either mails or submailboxes,
+ # but not both. Thunderbird separates these two by forcing server to
+ # accept '/' suffix in mailbox names in subscriptions list.
+ # The list is space-separated.
+ #imap_client_workarounds = outlook-idle
+}
+
+##
+## POP3 specific settings
+##
+
+protocol pop3 {
+ # Login executable location.
+ #login_executable = /usr/lib/dovecot/pop3-login
+
+ # POP3 executable location
+ #mail_executable = /usr/lib/dovecot/pop3
+
+ # Don't try to set mails non-recent or seen with POP3 sessions. This is
+ # mostly intended to reduce disk I/O. With maildir it doesn't move files
+ # from new/ to cur/, with mbox it doesn't write Status-header.
+ #pop3_no_flag_updates = no
+
+ # Support LAST command which exists in old POP3 specs, but has been removed
+ # from new ones. Some clients still wish to use this though. Enabling this
+ # makes RSET command clear all \Seen flags from messages.
+ #pop3_enable_last = no
+
+ # POP3 UIDL format to use. You can use following variables:
+ #
+ # %v - Mailbox UIDVALIDITY
+ # %u - Mail UID
+ # %m - MD5 sum of the mailbox headers in hex (mbox only)
+ # %f - filename (maildir only)
+ #
+ # If you want UIDL compatibility with other POP3 servers, use:
+ # UW's ipop3d : %08Xv%08Xu
+ # Courier version 0 : %f
+ # Courier version 1 : %u
+ # Courier version 2 : %v-%u
+ # Cyrus (<= 2.1.3) : %u
+ # Cyrus (>= 2.1.4) : %v.%u
+ # Older Dovecots : %v.%u
+ #
+ # Note that Outlook 2003 seems to have problems with %v.%u format which was
+ # Dovecot's default, so if you're building a new server it would be a good
+ # idea to change this. %08Xu%08Xv should be pretty fail-safe.
+ #
+ # NOTE: Nowadays this is required to be set explicitly, since the old
+ # default was bad but it couldn't be changed without breaking existing
+ # installations. %08Xu%08Xv will be the new default, so use it for new
+ # installations.
+ #
+ #pop3_uidl_format =
+
+ # POP3 logout format string:
+ # %t - number of TOP commands
+ # %T - number of bytes sent to client as a result of TOP command
+ # %r - number of RETR commands
+ # %R - number of bytes sent to client as a result of RETR command
+ # %d - number of deleted messages
+ # %m - number of messages (before deletion)
+ # %s - mailbox size in bytes (before deletion)
+ #pop3_logout_format = top=%t/%T, retr=%r/%R, del=%d/%m, size=%s
+
+ # Support for dynamically loadable modules.
+ #mail_use_modules = no
+ #mail_modules = /usr/lib/dovecot/modules/pop3
+
+ # Workarounds for various client bugs:
+ # outlook-no-nuls:
+ # Outlook and Outlook Express hang if mails contain NUL characters.
+ # This setting replaces them with 0x80 character.
+ # oe-ns-eoh:
+ # Outlook Express and Netscape Mail breaks if end of headers-line is
+ # missing. This option simply sends it if it's missing.
+ # The list is space-separated.
+ #pop3_client_workarounds =
+}
+
+##
+## dovecot-lda specific settings
+##
+
+# protocol lda {
+ # If you wish to use plugins you need to specify plugin directory
+ # For example quota enforcing is implemented by plugin
+ #module_dir = /usr/local/lib/dovecot/lda
+
+ # Address from LDA should send MDNs like out of quota
+ # postmaster_address = postmaster@your.dom
+
+ # If there is no user-specific Sieve-script, global Sieve script is
+ # executed if set.
+ #global_script_path =
+
+ # UNIX socket path to master authentication server to find users.
+ #auth_socket_path = /var/run/dovecot-auth-master
+# }
+
+##
+## Authentication processes
+##
+
+# Executable location
+#auth_executable = /usr/lib/dovecot/dovecot-auth
+
+# Set max. process size in megabytes.
+#auth_process_size = 256
+
+# Authentication cache size in kilobytes. 0 means it's disabled.
+# Note that bsdauth, PAM and vpopmail require cache_key to be set for caching
+# to be used. Also note that currently auth cache doesn't work very well if
+# you're using multiple passdbs with same usernames in them.
+#auth_cache_size = 0
+# Time to live in seconds for cached data. After this many seconds the cached
+# record is no longer used, *except* if the main database lookup returns
+# internal failure.
+#auth_cache_ttl = 3600
+
+# Space separated list of realms for SASL authentication mechanisms that need
+# them. You can leave it empty if you don't want to support multiple realms.
+# Many clients simply use the first one listed here, so keep the default realm
+# first.
+#auth_realms =
+
+# Default realm/domain to use if none was specified. This is used for both
+# SASL realms and appending @domain to username in plaintext logins.
+#auth_default_realm =
+
+# List of allowed characters in username. If the user-given username contains
+# a character not listed in here, the login automatically fails. This is just
+# an extra check to make sure user can't exploit any potential quote escaping
+# vulnerabilities with SQL/LDAP databases. If you want to allow all characters,
+# set this value to empty.
+#auth_username_chars = abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890.-_@
+
+# Username character translations before it's looked up from databases. The
+# value contains series of from -> to characters. For example "#@/@" means
+# that '#' and '/' characters are translated to '@'.
+#auth_username_translation =
+
+# Username to use for users logging in with ANONYMOUS SASL mechanism
+#auth_anonymous_username = anonymous
+
+# More verbose logging. Useful for figuring out why authentication isn't
+# working.
+#auth_verbose = no
+
+# Even more verbose logging for debugging purposes. Shows for example SQL
+# queries.
+#auth_debug = no
+
+# In case of password mismatches, log the passwords and used scheme so the
+# problem can be debugged. Requires auth_debug=yes to be set.
+#auth_debug_passwords = no
+
+# Maximum number of dovecot-auth worker processes. They're used to execute
+# blocking passdb and userdb queries (eg. MySQL and PAM). They're
+# automatically created and destroyed as needed.
+#auth_worker_max_count = 30
+
+# Kerberos keytab to use for the GSSAPI mechanism. Will use the system
+# default (usually /etc/krb5.keytab) if not specified.
+#auth_krb5_keytab =
+
+auth default {
+ # Space separated list of wanted authentication mechanisms:
+ # plain digest-md5 cram-md5 apop anonymous gssapi
+ mechanisms = plain
+
+ ##
+ ## dovecot-lda specific settings
+ ##
+ # socket listen {
+ # master {
+ # path = /var/run/dovecot-auth-master
+ # mode = 0600
+ # user = vmail # User running Dovecot LDA
+ # #group = mail # Or alternatively mode 0660 + LDA user in this group
+ # }
+ # }
+
+ #
+ # Password database is used to verify user's password (and nothing more).
+ # You can have multiple passdbs and userdbs. This is useful if you want to
+ # allow both system users (/etc/passwd) and virtual users to login without
+ # duplicating the system users into virtual database.
+ #
+ # http://wiki.dovecot.org/Authentication
+ #
+
+ # Users can be temporarily disabled by adding a passdb with deny=yes.
+ # If the user is found from that database, authentication will fail.
+ # The deny passdb should always be specified before others, so it gets
+ # checked first. Here's an example:
+ #passdb passwd-file {
+ # File contains a list of usernames, one per line
+ #args = /etc/dovecot.deny
+ #deny = yes
+ #}
+
+ # PAM authentication. Preferred nowadays by most systems.
+ # Note that PAM can only be used to verify if user's password is correct,
+ # so it can't be used as userdb. If you don't want to use a separate user
+ # database (passwd usually), you can use static userdb.
+# passdb pam {
+ # [session=yes] [cache_key=<key>] [<service name>]
+ #
+ # session=yes makes Dovecot open and immediately close PAM session. Some
+ # PAM plugins need this to work, such as pam_mkhomedir.
+ #
+ # cache_key can be used to enable authentication caching for PAM
+ # (auth_cache_size also needs to be set). It isn't enabled by default
+ # because PAM modules can do all kinds of checks besides checking password,
+ # such as checking IP address. Dovecot can't know about these checks
+ # without some help. cache_key is simply a list of variables (see
+ # /usr/share/doc/dovecot-common/variables.txt) which must match for the
+ # cached data to be used.
+ # Here are some examples:
+ # %u - Username must match. Probably sufficient for most uses.
+ # %u%r - Username and remote IP address must match.
+ # %u%s - Username and service (ie. IMAP, POP3) must match.
+ #
+ # If service name is "*", it means the authenticating service name
+ # is used, eg. pop3 or imap.
+ #
+ # Some examples:
+ # args = session=yes *
+ # args = cache_key=%u dovecot
+ #args = dovecot
+# }
+
+ # /etc/passwd or similar, using getpwnam()
+ # In many systems nowadays this uses Name Service Switch, which is
+ # configured in /etc/nsswitch.conf.
+ passdb passwd {
+ }
+
+ # /etc/shadow or similiar, using getspnam(). Deprecated by PAM nowadays.
+ #passdb shadow {
+ #}
+
+ # BSD authentication. Used by at least OpenBSD.
+ #passdb bsdauth {
+ # [cache_key=<key>] - See cache_key in PAM for explanation.
+ #args =
+ #}
+
+ # passwd-like file with specified location
+ #passdb passwd-file {
+ # Path for passwd-file
+ #args =
+ #}
+
+ # checkpassword executable authentication
+ # NOTE: You will probably want to use "userdb prefetch" with this.
+ #passdb checkpassword {
+ # Path for checkpassword binary
+ #args =
+ #}
+
+ # SQL database
+ #passdb sql {
+ # Path for SQL configuration file, see /etc/dovecot/dovecot-sql.conf for
+ # example
+ #args =
+ #}
+
+ # LDAP database
+ #passdb ldap {
+ # Path for LDAP configuration file, see /etc/dovecot/dovecot-ldap.conf for
+ # example
+ #args =
+ #}
+
+ # vpopmail authentication
+ #passdb vpopmail {
+ # [cache_key=<key>] - See cache_key in PAM for explanation.
+ #args =
+ #}
+
+ #
+ # User database specifies where mails are located and what user/group IDs
+ # own them. For single-UID configuration use "static".
+ #
+ # http://wiki.dovecot.org/Authentication
+ # http://wiki.dovecot.org/VirtualUsers
+ #
+
+ # /etc/passwd or similar, using getpwnam()
+ # In many systems nowadays this uses Name Service Switch, which is
+ # configured in /etc/nsswitch.conf.
+ userdb passwd {
+ }
+
+ # passwd-like file with specified location
+ #userdb passwd-file {
+ # Path for passwd-file
+ #args =
+ #}
+
+ # static settings generated from template
+ #userdb static {
+ # Template for settings. Can return anything a userdb could normally
+ # return, eg.: uid, gid, home, mail, nice
+ #
+ # A few examples:
+ #
+ # args = uid=500 gid=500 home=/var/mail/%u
+ # args = uid=500 gid=500 home=/home/%u mail=mbox:/home/%u/mail nice=10
+ #
+ #args =
+ #}
+
+ # SQL database
+ #userdb sql {
+ # Path for SQL configuration file, see /etc/dovecot/dovecot-sql.conf for
+ # example
+ #args =
+ #}
+
+ # LDAP database
+ #userdb ldap {
+ # Path for LDAP configuration file, see /etc/dovecot/dovecot-ldap.conf for
+ # example
+ #args =
+ #}
+
+ # vpopmail
+ #userdb vpopmail {
+ #}
+
+ # "prefetch" user database means that the passdb already provided the
+ # needed information and there's no need to do a separate userdb lookup.
+ # This can be made to work with SQL and LDAP databases, see their example
+ # configuration files for more information how to do it.
+ # http://wiki.dovecot.org/AuthSpecials
+ #userdb prefetch {
+ #}
+
+ # User to use for the process. This user needs access to only user and
+ # password databases, nothing else. Only shadow and pam authentication
+ # requires roots, so use something else if possible. Note that passwd
+ # authentication with BSDs internally accesses shadow files, which also
+ # requires roots. Note that this user is NOT used to access mails.
+ # That user is specified by userdb above.
+ user = root
+
+ # Directory where to chroot the process. Most authentication backends don't
+ # work if this is set, and there's no point chrooting if auth_user is root.
+ # Note that valid_chroot_dirs isn't needed to use this setting.
+ #chroot =
+
+ # Number of authentication processes to create
+ #count = 1
+
+ # Require a valid SSL client certificate or the authentication fails.
+ #ssl_require_client_cert = no
+
+ # Take the username from client's SSL certificate, using X509_NAME_oneline()
+ # which typically uses subject's Distinguished Name.
+ #ssl_username_from_cert = no
+}
+
+# It's possible to export the authentication interface to other programs,
+# for example SMTP server which supports talking to Dovecot. Client socket
+# handles the actual authentication - you give it a username and password
+# and it returns OK or failure. So it's pretty safe to allow anyone access to
+# it. Master socket is used to a) query if given client was successfully
+# authenticated, b) userdb lookups.
+
+# listener sockets will be created by Dovecot's master process using the
+# settings given inside the auth section
+#auth default_with_listener {
+# mechanisms = plain
+# passdb pam {
+# }
+# userdb passwd {
+# }
+# socket listen {
+# master {
+# path = /var/run/dovecot-auth-master
+# # WARNING: Giving untrusted users access to master socket may be a
+# # security risk, don't give too wide permissions to it!
+# #mode = 0600
+# # Default user/group is the one who started dovecot-auth (root)
+# #user =
+# #group =
+# }
+# client {
+# path = /var/run/dovecot-auth-client
+# mode = 0660
+# }
+# }
+#}
+
+# connect sockets are assumed to be already running, Dovecot's master
+# process only tries to connect to them. They don't need any other settings
+# than path for the master socket, as the configuration is done elsewhere.
+# Note that the client sockets must exist in login_dir.
+#auth external {
+# socket connect {
+# master {
+# path = /var/run/dovecot-auth-master
+# }
+# }
+#}
+
+plugin {
+ # Here you can give some extra environment variables to mail processes.
+ # This is mostly meant for passing parameters to plugins. %variable
+ # expansion is done for all values.
+
+ # Quota plugin
+ #quota = dirsize:%h/mail
+
+ # Convert plugin. If set, specifies the source storage path which is
+ # converted to destination storage (default_mail_env).
+ #convert_mail = mbox:%h/mail
+}
--- /dev/null
+#!/bin/sh /etc/rc.common
+# Copyright (C) 2006,2007 OpenWrt.org
+
+START=99
+
+RUN_D=/var/run/dovecot
+PID_F=$RUN_D/master.pid
+
+start() {
+ mkdir -p $RUN_D
+ dovecot
+}
+
+stop() {
+ [ -f $PID_F ] && kill $(cat $PID_F)
+}
--- /dev/null
+--- ./configure.in.dovecot 2005-07-30 23:44:48.571463846 +0100
++++ ./configure.in 2005-07-31 00:22:17.564381142 +0100
+@@ -529,7 +529,22 @@
+ echo "..ignoring as requested.."
+ ],[
+ AC_MSG_RESULT(no)
+-],[])
++],[
++
++ AC_MSG_RESULT(can't check)
++
++ echo
++ echo "You are cross compiling so I can't tell if the destination uses a signed"
++ echo "size_t. Dovecot isn't designed to work with a signed size_t, It probably"
++ echo "works just fine, but it's less resistant to buffer overflows."
++ echo "You may want to manually check what your target uses for size_t."
++ echo "To compile Dovecot anyway, set ignore_signed_size=1 environment."
++
++ if test "$ignore_signed_size" = ""; then
++ AC_MSG_ERROR([aborting])
++ fi
++ echo "..proceeding as requested.."
++])
+
+ dnl Note: we check size_t rather than ssize_t here, because on OSX 10.2
+ dnl ssize_t = int and size_t = unsigned long. We're mostly concerned about
+@@ -659,7 +674,10 @@
+ ], [
+ AC_MSG_RESULT([check failed, assuming 31])
+ max_bits=31
+-],[])
++],[
++ AC_MSG_RESULT([cross compiling, assuming 31])
++ max_bits=31
++])
+ AC_DEFINE_UNQUOTED(TIME_T_MAX_BITS, $max_bits, max. time_t bits gmtime() can handle)
+
+ dnl * do we have struct iovec
+@@ -768,6 +786,8 @@
+ ], [
+ AC_MSG_RESULT(no)
+ AC_DEFINE(MMAP_CONFLICTS_WRITE,, [Define if shared mmaps don't get updated by write()s])
++], [
++ AC_MSG_RESULT(cross-compiling so target PROBABLY isn't the buggy version of OpenBSD)
+ ])
+
+ dnl * see if fd passing works
+@@ -831,6 +851,9 @@
+ if test $i = 2; then
+ AC_MSG_RESULT(no)
+ fi
++ ], [
++ CFLAGS=$old_cflags
++ AC_MSG_RESULT(cross compiling so target probably isn't 64 bit)
+ ])
+ done
+
+@@ -878,7 +901,7 @@
+ dnl ***
+
+ AC_CACHE_CHECK([for an implementation of va_copy()],lib_cv_va_copy,[
+- AC_RUN_IFELSE([AC_LANG_SOURCE([[
++ AC_LINK_IFELSE([AC_LANG_SOURCE([[
+ #include <stdarg.h>
+ void f (int i, ...) {
+ va_list args1, args2;
+@@ -896,7 +919,7 @@
+ [lib_cv_va_copy=no],[])
+ ])
+ AC_CACHE_CHECK([for an implementation of __va_copy()],lib_cv___va_copy,[
+- AC_RUN_IFELSE([AC_LANG_SOURCE([[
++ AC_LINK_IFELSE([AC_LANG_SOURCE([[
+ #include <stdarg.h>
+ void f (int i, ...) {
+ va_list args1, args2;
+@@ -941,7 +964,8 @@
+ return 0;
+ }]])],
+ [lib_cv_va_val_copy=yes],
+- [lib_cv_va_val_copy=no],[])
++ [lib_cv_va_val_copy=no],
++ [lib_cv_va_val_copy=yes])
+ ])
+
+ if test "x$lib_cv_va_val_copy" = "xno"; then
--- /dev/null
+#
+# Copyright (C) 2006-2008 OpenWrt.org
+#
+# This is free software, licensed under the GNU General Public License v2.
+# See /LICENSE for more information.
+#
+# $Id$
+
+include $(TOPDIR)/rules.mk
+
+PKG_NAME:=fetchmail
+PKG_VERSION:=6.2.5
+PKG_RELEASE:=1
+
+PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
+PKG_SOURCE_URL:=http://www.catb.org/~esr/fetchmail/
+PKG_MD5SUM:=9956b30139edaa4f5f77c4d0dbd80225
+
+include $(INCLUDE_DIR)/package.mk
+
+define Package/fetchmail
+ SECTION:=mail
+ CATEGORY:=Mail
+ TITLE:=Remote mail retriever
+ URL:=http://www.catb.org/~esr/fetchmail/
+endef
+
+define Package/fetchmail/description
+ Retrieves remote mail via POP/IMAP.
+ Very useful in conjunction with mutt.
+endef
+
+define Build/Configure
+ $(call Build/Configure/Default, \
+ --enable-fallback=procmail \
+ --without-hesiod \
+ , \
+ ac_cv_path_procmail=/usr/sbin/procmail \
+ )
+endef
+
+define Build/Compile
+ $(MAKE) -C $(PKG_BUILD_DIR) \
+ DESTDIR="$(PKG_INSTALL_DIR)" \
+ all install
+endef
+
+define Package/fetchmail/install
+ $(INSTALL_DIR) $(1)/usr/bin
+ $(INSTALL_BIN) $(PKG_INSTALL_DIR)/usr/bin/fetchmail $(1)/usr/bin/
+endef
+
+$(eval $(call BuildPackage,fetchmail))
--- /dev/null
+diff -urN fetchmail-6.2.5/config.sub fetchmail-6.2.5.new/config.sub
+--- fetchmail-6.2.5/config.sub 2003-07-17 03:03:20.000000000 +0200
++++ fetchmail-6.2.5.new/config.sub 2006-03-30 00:36:11.000000000 +0200
+@@ -176,7 +176,7 @@
+ | 580 | i960 | h8300 \
+ | x86 | ppcbe | mipsbe | mipsle | shbe | shle | armbe | armle \
+ | hppa | hppa1.0 | hppa1.1 | hppa2.0 | hppa2.0w | hppa2.0n \
+- | hppa64 \
++ | hppa64 | x86_64 \
+ | alpha | alphaev[4-8] | alphaev56 | alphapca5[67] \
+ | alphaev6[78] \
+ | we32k | ns16k | clipper | i370 | sh | powerpc | powerpcle \
+@@ -194,7 +194,7 @@
+ # We use `pc' rather than `unknown'
+ # because (1) that's what they normally are, and
+ # (2) the word "unknown" tends to confuse beginning users.
+- i[34567]86)
++ i*86 | x86_64)
+ basic_machine=$basic_machine-pc
+ ;;
+ # Object if more than one company name word.
+@@ -209,7 +209,7 @@
+ | mips-* | pyramid-* | tron-* | a29k-* | romp-* | rs6000-* \
+ | power-* | none-* | 580-* | cray2-* | h8300-* | h8500-* | i960-* \
+ | xmp-* | ymp-* \
+- | x86-* | ppcbe-* | mipsbe-* | mipsle-* | shbe-* | shle-* | armbe-* | armle-* \
++ | x86-* | x86_64-* | ppcbe-* | mipsbe-* | mipsle-* | shbe-* | shle-* | armbe-* | armle-* \
+ | hppa-* | hppa1.0-* | hppa1.1-* | hppa2.0-* | hppa2.0w-* \
+ | hppa2.0n-* | hppa64-* \
+ | alpha-* | alphaev[4-8]-* | alphaev56-* | alphapca5[67]-* \
+@@ -256,6 +256,12 @@
+ basic_machine=a29k-none
+ os=-bsd
+ ;;
++ amd64)
++ basic_machine=x86_64-pc
++ ;;
++ amd64-*)
++ basic_machine=x86_64-`echo $basic_machine | sed 's/^[^-]*-//'`
++ ;;
+ amdahl)
+ basic_machine=580-amdahl
+ os=-sysv
--- /dev/null
+diff -ruN fetchmail-6.2.5-old/po/fr.po.rej fetchmail-6.2.5-new/po/fr.po.rej
+--- fetchmail-6.2.5-old/po/fr.po.rej 2003-07-17 03:23:26.000000000 +0200
++++ fetchmail-6.2.5-new/po/fr.po.rej 1970-01-01 01:00:00.000000000 +0100
+@@ -1,17 +0,0 @@
+-***************
+-*** 2166,2172 ****
+- #: rcfile_y.y:433
+- #, fuzzy, c-format
+- msgid "File %s must be a regular file.\n"
+-- msgstr "Le fichier %s doit etre un lien symbolique.\n"
+-
+- #: rcfile_y.y:440
+- #, c-format
+---- 2166,2172 ----
+- #: rcfile_y.y:433
+- #, fuzzy, c-format
+- msgid "File %s must be a regular file.\n"
+-+ msgstr "Le fichier %s doit ĂȘtre un fichier normal.\n"
+-
+- #: rcfile_y.y:440
+- #, c-format
--- /dev/null
+#
+# Copyright (C) 2006-2008 OpenWrt.org
+#
+# This is free software, licensed under the GNU General Public License v2.
+# See /LICENSE for more information.
+#
+# $Id$
+
+include $(TOPDIR)/rules.mk
+
+PKG_NAME:=imapfilter
+PKG_VERSION:=1.2.2
+PKG_RELEASE:=1
+
+PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
+PKG_SOURCE_URL:=http://imapfilter.hellug.gr/source/
+PKG_MD5SUM:=4c1f28dffbb727a4769948f10baccd79
+
+include $(INCLUDE_DIR)/package.mk
+
+define Package/imapfilter
+ SECTION:=mail
+ CATEGORY:=Mail
+ DEPENDS:=+liblua +libopenssl
+ TITLE:=IMAP server based email filtering
+ URL:=http://imapfilter.hellug.gr/
+endef
+
+define Build/Configure
+ (cd $(PKG_BUILD_DIR); \
+ ./configure \
+ -d /usr \
+ );
+endef
+
+define Build/Compile
+ $(MAKE) -C $(PKG_BUILD_DIR) \
+ $(TARGET_CONFIGURE_OPTS) \
+ INCDIRS="-I$(STAGING_DIR)/usr/include -I$(STAGING_DIR)/include" \
+ LIBDIRS="-L$(STAGING_DIR)/usr/lib -L$(STAGING_DIR)/lib" \
+ MYCFLAGS="$(TARGET_CFLAGS)"
+endef
+
+define Package/imapfilter/conffiles
+/etc/imapfilter/config.lua
+endef
+
+define Package/imapfilter/install
+ $(INSTALL_DIR) $(1)/usr/bin
+ $(INSTALL_BIN) $(PKG_BUILD_DIR)/imapfilter $(1)/usr/bin/
+ $(INSTALL_DIR) $(1)/etc/imapfilter
+ $(INSTALL_CONF) $(PKG_BUILD_DIR)/sample.config.lua $(1)/etc/imapfilter/config.lua
+ $(INSTALL_DIR) $(1)/usr/share/imapfilter
+ $(INSTALL_DATA) $(PKG_BUILD_DIR)/interface.lua $(1)/usr/share/imapfilter/
+ $(INSTALL_DATA) $(PKG_BUILD_DIR)/auxiliary.lua $(1)/usr/share/imapfilter/
+endef
+
+$(eval $(call BuildPackage,imapfilter))
--- /dev/null
+--- imapfilter-1.2.2/pathnames.h 2006-08-01 14:11:20.000000000 +0200
++++ imapfilter-1.2.2/pathnames.h 2006-09-07 23:58:12.000000000 +0200
+@@ -3,7 +3,7 @@
+
+
+ /* Program's home directory. */
+-#define PATHNAME_HOME ".imapfilter"
++#define PATHNAME_HOME "/etc/imapfilter"
+
+ /* Program's configuration file. */
+ #define PATHNAME_CONFIG PATHNAME_HOME "/config.lua"
+@@ -18,7 +18,7 @@
+ #define PATHNAME_CERTS PATHNAME_HOME "/certificates"
+
+ /* Debug temporary file template. */
+-#define PATHNAME_DEBUG PATHNAME_HOME "/debug.XXXXXX"
++#define PATHNAME_DEBUG "/tmp/imapfilterdebug.XXXXXX"
+
+
+ #endif /* PATHNAMES_H */
+--- imapfilter-1.2.2/imapfilter.c 2006-09-08 00:02:11.000000000 +0200
++++ imapfilter-1.2.2/imapfilter.c 2006-09-08 00:02:32.000000000 +0200
+@@ -50,7 +50,7 @@
+ opts.config = NULL;
+ opts.oneline = NULL;
+
+- env.home = getenv("HOME");
++ env.home = "";
+ env.pathmax = -1;
+
+ while ((c = getopt(argc, argv, "Vc:de:il:v?")) != -1) {
--- /dev/null
+#
+# Copyright (C) 2007-2008 OpenWrt.org
+#
+# This is free software, licensed under the GNU General Public License v2.
+# See /LICENSE for more information.
+#
+# $Id$
+
+include $(TOPDIR)/rules.mk
+
+PKG_NAME:=mini-sendmail
+PKG_VERSION:=1.3.6
+PKG_RELEASE:=2
+
+PKG_SOURCE:=mini_sendmail-$(PKG_VERSION).tar.gz
+PKG_SOURCE_URL:=http://www.acme.com/software/mini_sendmail/
+PKG_MD5SUM:=fb1585d2ad81c519a26d83bfd783dee8
+
+include $(INCLUDE_DIR)/package.mk
+
+define Package/mini-sendmail
+ SECTION:=mail
+ CATEGORY:=Mail
+ TITLE:=A small sendmail-compatible mail forwarder
+ URL:=http://www.acme.com/software/mini_sendmail/
+endef
+
+define Package/mini-sendmail/description
+ mini_sendmail reads its standard input up to an end-of-file and sends a
+ copy of the message found there to all of the addresses listed.
+ The message is sent by connecting to a local SMTP server. This means
+ mini_sendmail can be used to send email from inside a chroot(2) area.
+endef
+
+MAKE_FLAGS += \
+ OFLAGS="$(TARGET_CFLAGS)"
+
+define Package/mini-sendmail/install
+ $(INSTALL_DIR) $(1)/usr/sbin
+ $(INSTALL_BIN) $(PKG_BUILD_DIR)/mini_sendmail $(1)/usr/sbin/
+ ln -sf mini_sendmail $(1)/usr/sbin/sendmail
+endef
+
+$(eval $(call BuildPackage,mini-sendmail))
--- /dev/null
+Index: mini_sendmail-1.3.6/mini_sendmail.c
+===================================================================
+--- mini_sendmail-1.3.6.orig/mini_sendmail.c 2007-08-28 17:58:37.000000000 +0200
++++ mini_sendmail-1.3.6/mini_sendmail.c 2007-08-28 17:58:37.000000000 +0200
+@@ -542,6 +542,7 @@
+ }
+
+ /* Strip off any angle brackets. */
++/*
+ while ( len > 0 && *recipient == '<' )
+ {
+ ++recipient;
+@@ -551,6 +552,23 @@
+ --len;
+
+ (void) snprintf( buf, sizeof(buf), "RCPT TO:<%.*s>", len, recipient );
++*/
++ if (len > 0 && recipient[len-1] == '>' )
++ {
++ /* "<name@domain>" or: "Full Name <name@domain>" */
++ while (len > 0 && *recipient != '<' )
++ {
++ ++recipient;
++ --len;
++ }
++ (void) snprintf( buf, sizeof(buf), "RCPT TO:%.*s", len, recipient );
++ }
++ else
++ {
++ /* name@domain */
++ (void) snprintf( buf, sizeof(buf), "RCPT TO:<%.*s>", len, recipient );
++ }
++
+ send_command( buf );
+ status = read_response();
+ if ( status != 250 && status != 251 )
--- /dev/null
+Index: mini_sendmail-1.3.6/Makefile
+===================================================================
+--- mini_sendmail-1.3.6.orig/Makefile 2007-08-28 17:58:37.000000000 +0200
++++ mini_sendmail-1.3.6/Makefile 2007-08-28 17:58:37.000000000 +0200
+@@ -7,9 +7,10 @@
+ BINDIR = /usr/local/sbin
+ MANDIR = /usr/local/man
+ CC = gcc
+-CFLAGS = -O
++OFLAGS = -O
++CFLAGS = $(OFLAGS)
+ #CFLAGS = -g
+-LDFLAGS = -s -static
++LDFLAGS =
+ #LDFLAGS = -g -static
+ LDLIBS = $(SYSV_LIBS)
+
--- /dev/null
+#
+# Copyright (C) 2006-2008 OpenWrt.org
+#
+# This is free software, licensed under the GNU General Public License v2.
+# See /LICENSE for more information.
+#
+# $Id$
+
+include $(TOPDIR)/rules.mk
+
+PKG_NAME:=mutt
+PKG_VERSION:=1.5.16
+PKG_RELEASE:=2
+
+PKG_SOURCE_URL:=@SF/mutt
+PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
+PKG_MD5SUM:=10eff7024dbb7ce1f773d688a69ea9db
+
+include $(INCLUDE_DIR)/package.mk
+
+define Package/mutt
+ SECTION:=mail
+ CATEGORY:=Mail
+ DEPENDS:=+libopenssl +libncurses
+ TITLE:=Console mail client
+ URL:=http://www.mutt.org/
+endef
+
+CONFIGURE_ARGS += \
+ --includedir=$(PKG_BUILD_DIR)/. \
+ --oldincludedir=$(PKG_BUILD_DIR)/. \
+ --enable-pop \
+ --enable-imap \
+ --with-ssl
+
+define Package/mutt/install
+ $(INSTALL_DIR) $(1)/usr/bin
+ $(CP) $(PKG_BUILD_DIR)/mutt $(1)/usr/bin/
+endef
+
+$(eval $(call BuildPackage,mutt))
--- /dev/null
+#
+# Copyright (C) 2006-2008 OpenWrt.org
+#
+# This is free software, licensed under the GNU General Public License v2.
+# See /LICENSE for more information.
+#
+# $Id$
+
+include $(TOPDIR)/rules.mk
+
+PKG_NAME:=procmail
+PKG_VERSION:=3.22
+PKG_RELEASE:=1
+
+PKG_SOURCE_URL:=http://www.procmail.org/
+PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
+PKG_MD5SUM:=1678ea99b973eb77eda4ecf6acae53f1
+
+include $(INCLUDE_DIR)/package.mk
+
+define Package/procmail
+ SECTION:=mail
+ CATEGORY:=Mail
+ TITLE:=Mail processing tool
+ URL:=http://www.procmail.org
+endef
+
+define Package/procmail/description
+ Procmail is able to process and classify incoming mail into
+ different mail boxes.
+ Very useful in conjunction with mutt.
+endef
+
+define Build/Compile
+ $(MAKE) -C $(PKG_BUILD_DIR)/src -f ../Makefile.openwrt \
+ $(TARGET_CONFIGURE_OPTS)
+endef
+
+define Package/procmail/install
+ $(INSTALL_DIR) $(1)/usr/bin
+ $(CP) $(PKG_BUILD_DIR)/src/procmail $(1)/usr/bin/
+ $(CP) $(PKG_BUILD_DIR)/src/formail $(1)/usr/bin/
+endef
+
+$(eval $(call BuildPackage,procmail))
--- /dev/null
+This patch is required to make procmail cross compile - it tries to run some automatic tests which
+obviously do not work in a cross compiled environment.
+
+
+diff -Naur procmail-3.22_orig/autoconf.h procmail-3.22/autoconf.h
+--- procmail-3.22_orig/autoconf.h 1970-01-01 10:00:00.000000000 +1000
++++ procmail-3.22/autoconf.h 2006-03-23 12:15:36.000000000 +1100
+@@ -0,0 +1,21 @@
++/* This file was automagically generated by autoconf */
++
++/* 5 moves in 64 steps of size 16384 when reallocing */
++#define NOpw_class
++#define NOstrlcat
++#define NOsetrgid
++#define MAX_argc 7588
++/* Your system's strstr() is 1.12 times FASTER than my C-routine */
++#define UDP_protocolno 17
++#define BIFF_serviceport "512"
++#define IP_localhost {127,0,0,1}
++#define MAILSPOOLDIR "/var/spool/mail/"
++#define SENDMAIL "/usr/sbin/sendmail"
++#define CF_no_procmail_yet
++#define buggy_SENDMAIL
++#define defPATH "PATH=$HOME/bin:/bin:/usr/bin:/usr/local/bin:/usr/bin/X11"
++#define defSPATH "PATH=/bin:/usr/bin:/usr/local/bin:/usr/bin/X11"
++#define PM_VERSION "3.22"
++/* Hotwire LOCKINGTEST=100 */
++/* Procmail will lock via: dotlocking, fcntl() */
++/* autoconf completed */
+diff -Naur procmail-3.22_orig/Makefile.openwrt procmail-3.22/Makefile.openwrt
+--- procmail-3.22_orig/Makefile.openwrt 1970-01-01 10:00:00.000000000 +1000
++++ procmail-3.22/Makefile.openwrt 2006-03-23 12:15:36.000000000 +1100
+@@ -0,0 +1,18 @@
++PM_OBJ=cstdio.o common.o exopen.o goodies.o locking.o \
++ mailfold.o foldinfo.o misc.o pipes.o regexp.o robust.o \
++ sublib.o acommon.o mcommon.o lastdirsep.o authenticate.o \
++ lmtp.o memblk.o variables.o from.o comsat.o
++
++FM_OBJ=common.o fields.o formisc.o sublib.o ecommon.o \
++ acommon.o
++
++LDFLAGS = -lm -lnsl -ldl -lc
++CFLAGS = -Os -DPROCMAIL
++
++all: procmail formail
++
++procmail: procmail.o $(PM_OBJ)
++ $(CC) $(CFLAGS) $@.o $(PM_OBJ) -o $@ $(LDFLAGS)
++
++formail: formail.o $(FM_OBJ)
++ $(CC) $(CFLAGS) $@.o $(FM_OBJ) -o $@ $(LDFLAGS)
--- /dev/null
+#
+# Copyright (C) 2007-2008 OpenWrt.org
+#
+# This is free software, licensed under the GNU General Public License v2.
+# See /LICENSE for more information.
+#
+# $Id$
+
+include $(TOPDIR)/rules.mk
+
+PKG_NAME:=ssmtp
+PKG_VERSION:=2.61
+PKG_RELEASE:=2
+
+PKG_SOURCE:=$(PKG_NAME)_$(PKG_VERSION).orig.tar.gz
+PKG_SOURCE_URL:=http://ftp.debian.org/debian/pool/main/s/ssmtp/
+PKG_MD5SUM:=957e6fff08625fe34f4fc33d0925bbc9
+
+include $(INCLUDE_DIR)/package.mk
+
+define Package/ssmtp
+ SECTION:=mail
+ CATEGORY:=Mail
+ DEPENDS:=+libopenssl
+ TITLE:=A minimal and secure mail sender
+ URL:=http://packages.debian.org/stable/mail/ssmtp
+endef
+
+define Package/ssmtp/description
+ A secure, effective and simple way of getting mail off a system to your
+ mail hub. It contains no suid-binaries or other dangerous things - no
+ mail spool to poke around in, and no daemons running in the background.
+ mail is simply forwarded to the configured mailhost. Extremely easy
+ configuration.
+endef
+
+EXTRA_CFLAGS+=-I$(STAGING_DIR)/usr/include -I$(STAGING_DIR)/include
+EXTRA_LDFLAGS+=-L$(STAGING_DIR)/usr/lib -Wl,-rpath-link,$(STAGING_DIR)/usr/lib
+
+TARGET_CONFIGURE_OPTS+=\
+ CC="$(TARGET_CC) $(EXTRA_CFLAGS) $(EXTRA_LDFLAGS)"
+
+CONFIGURE_ARGS += \
+ --enable-ssl
+
+define Package/ssmtp/install
+ $(INSTALL_DIR) $(1)/etc/ssmtp
+ $(INSTALL_DATA) $(PKG_BUILD_DIR)/ssmtp.conf $(1)/etc/ssmtp/
+ $(INSTALL_DATA) $(PKG_BUILD_DIR)/revaliases $(1)/etc/ssmtp/
+ $(INSTALL_DIR) $(1)/usr/sbin
+ $(INSTALL_BIN) $(PKG_BUILD_DIR)/ssmtp $(1)/usr/sbin/
+ ln -sf ssmtp $(1)/usr/sbin/sendmail
+endef
+
+$(eval $(call BuildPackage,ssmtp))
--- /dev/null
+Index: ssmtp-2.61/ssmtp.conf
+===================================================================
+--- ssmtp-2.61.orig/ssmtp.conf 2007-08-30 20:56:56.000000000 +0200
++++ ssmtp-2.61/ssmtp.conf 2007-08-30 20:56:56.000000000 +0200
+@@ -36,3 +36,8 @@
+
+ # Use this RSA certificate.
+ #TLSCert=/etc/ssl/certs/ssmtp.pem
++
++# Get enhanced (*really* enhanced) debugging information in the logs
++# If you want to have debugging of the config file parsing, move this option
++# to the top of the config file and uncomment
++#Debug=YES
+Index: ssmtp-2.61/ssmtp.c
+===================================================================
+--- ssmtp-2.61.orig/ssmtp.c 2007-08-30 20:56:56.000000000 +0200
++++ ssmtp-2.61/ssmtp.c 2007-08-30 20:56:56.000000000 +0200
+@@ -93,6 +93,7 @@
+ static char hextab[]="0123456789abcdef";
+ #endif
+
++ssize_t outbytes;
+
+ /*
+ log_event() -- Write event to syslog (or log file if defined)
+@@ -129,7 +130,7 @@
+ #endif
+ }
+
+-void smtp_write(int fd, char *format, ...);
++ssize_t smtp_write(int fd, char *format, ...);
+ int smtp_read(int fd, char *response);
+ int smtp_read_all(int fd, char *response);
+ int smtp_okay(int fd, char *response);
+@@ -150,7 +151,7 @@
+ if(isatty(fileno(stdin))) {
+ if(log_level > 0) {
+ log_event(LOG_ERR,
+- "stdin is a TTY - not saving to %s/dead.letter, pw->pw_dir");
++ "stdin is a TTY - not saving to %s/dead.letter", pw->pw_dir);
+ }
+ return;
+ }
+@@ -964,6 +965,17 @@
+ log_event(LOG_INFO, "Set AuthMethod=\"%s\"\n", auth_method);
+ }
+ }
++ else if (strcasecmp(p, "Debug") == 0)
++ {
++ if (strcasecmp(q, "YES") == 0)
++ {
++ log_level = 1;
++ }
++ else
++ {
++ log_level = 0;
++ }
++ }
+ else {
+ log_event(LOG_INFO, "Unable to set %s=\"%s\"\n", p, q);
+ }
+@@ -1232,10 +1244,11 @@
+ /*
+ smtp_write() -- A printf to an fd and append <CR/LF>
+ */
+-void smtp_write(int fd, char *format, ...)
++ssize_t smtp_write(int fd, char *format, ...)
+ {
+ char buf[(BUF_SZ + 1)];
+ va_list ap;
++ ssize_t outbytes = 0;
+
+ va_start(ap, format);
+ if(vsnprintf(buf, (BUF_SZ - 2), format, ap) == -1) {
+@@ -1252,7 +1265,9 @@
+ }
+ (void)strcat(buf, "\r\n");
+
+- (void)fd_puts(fd, buf, strlen(buf));
++ outbytes = fd_puts(fd, buf, strlen(buf));
++
++ return (outbytes >= 0) ? outbytes : 0;
+ }
+
+ /*
+@@ -1282,6 +1297,8 @@
+ int i, sock;
+ uid_t uid;
+
++ outbytes = 0;
++
+ uid = getuid();
+ if((pw = getpwuid(uid)) == (struct passwd *)NULL) {
+ die("Could not find password entry for UID %d", uid);
+@@ -1335,10 +1352,10 @@
+
+ /* If user supplied username and password, then try ELHO */
+ if(auth_user) {
+- smtp_write(sock, "EHLO %s", hostname);
++ outbytes += smtp_write(sock, "EHLO %s", hostname);
+ }
+ else {
+- smtp_write(sock, "HELO %s", hostname);
++ outbytes += smtp_write(sock, "HELO %s", hostname);
+ }
+ (void)alarm((unsigned) MEDWAIT);
+
+@@ -1354,7 +1371,7 @@
+ }
+
+ if(strcasecmp(auth_method, "cram-md5") == 0) {
+- smtp_write(sock, "AUTH CRAM-MD5");
++ outbytes += smtp_write(sock, "AUTH CRAM-MD5");
+ (void)alarm((unsigned) MEDWAIT);
+
+ if(smtp_read(sock, buf) != 3) {
+@@ -1369,7 +1386,7 @@
+ #endif
+ memset(buf, 0, sizeof(buf));
+ to64frombits(buf, auth_user, strlen(auth_user));
+- smtp_write(sock, "AUTH LOGIN %s", buf);
++ outbytes += smtp_write(sock, "AUTH LOGIN %s", buf);
+
+ (void)alarm((unsigned) MEDWAIT);
+ if(smtp_read(sock, buf) != 3) {
+@@ -1381,7 +1398,7 @@
+ #ifdef MD5AUTH
+ }
+ #endif
+- smtp_write(sock, "%s", buf);
++ outbytes += smtp_write(sock, "%s", buf);
+ (void)alarm((unsigned) MEDWAIT);
+
+ if(smtp_okay(sock, buf) == False) {
+@@ -1390,7 +1407,7 @@
+ }
+
+ /* Send "MAIL FROM:" line */
+- smtp_write(sock, "MAIL FROM:<%s>", uad);
++ outbytes += smtp_write(sock, "MAIL FROM:<%s>", uad);
+
+ (void)alarm((unsigned) MEDWAIT);
+
+@@ -1408,7 +1425,7 @@
+
+ while(rt->next) {
+ p = rcpt_remap(rt->string);
+- smtp_write(sock, "RCPT TO:<%s>", p);
++ outbytes += smtp_write(sock, "RCPT TO:<%s>", p);
+
+ (void)alarm((unsigned)MEDWAIT);
+
+@@ -1425,7 +1442,7 @@
+ while(p) {
+ /* RFC822 Address -> "foo@bar" */
+ q = rcpt_remap(addr_parse(p));
+- smtp_write(sock, "RCPT TO:<%s>", q);
++ outbytes += smtp_write(sock, "RCPT TO:<%s>", q);
+
+ (void)alarm((unsigned) MEDWAIT);
+
+@@ -1439,7 +1456,7 @@
+ }
+
+ /* Send DATA */
+- smtp_write(sock, "DATA");
++ outbytes += smtp_write(sock, "DATA");
+ (void)alarm((unsigned) MEDWAIT);
+
+ if(smtp_read(sock, buf) != 3) {
+@@ -1447,45 +1464,45 @@
+ die("%s", buf);
+ }
+
+- smtp_write(sock,
++ outbytes += smtp_write(sock,
+ "Received: by %s (sSMTP sendmail emulation); %s", hostname, arpadate);
+
+ if(have_from == False) {
+- smtp_write(sock, "From: %s", from);
++ outbytes += smtp_write(sock, "From: %s", from);
+ }
+
+ if(have_date == False) {
+- smtp_write(sock, "Date: %s", arpadate);
++ outbytes += smtp_write(sock, "Date: %s", arpadate);
+ }
+
+ #ifdef HASTO_OPTION
+ if(have_to == False) {
+- smtp_write(sock, "To: postmaster");
++ outbytes += smtp_write(sock, "To: postmaster");
+ }
+ #endif
+
+ ht = &headers;
+ while(ht->next) {
+- smtp_write(sock, "%s", ht->string);
++ outbytes += smtp_write(sock, "%s", ht->string);
+ ht = ht->next;
+ }
+
+ (void)alarm((unsigned) MEDWAIT);
+
+ /* End of headers, start body */
+- smtp_write(sock, "");
++ outbytes += smtp_write(sock, "");
+
+ while(fgets(buf, sizeof(buf), stdin)) {
+ /* Trim off \n, double leading .'s */
+ standardise(buf);
+
+- smtp_write(sock, "%s", buf);
++ outbytes += smtp_write(sock, "%s", buf);
+
+ (void)alarm((unsigned) MEDWAIT);
+ }
+ /* End of body */
+
+- smtp_write(sock, ".");
++ outbytes += smtp_write(sock, ".");
+ (void)alarm((unsigned) MAXWAIT);
+
+ if(smtp_okay(sock, buf) == 0) {
+@@ -1495,11 +1512,12 @@
+ /* Close conection */
+ (void)signal(SIGALRM, SIG_IGN);
+
+- smtp_write(sock, "QUIT");
++ outbytes += smtp_write(sock, "QUIT");
+ (void)smtp_okay(sock, buf);
+ (void)close(sock);
+
+- log_event(LOG_INFO, "Sent mail for %s (%s)", from_strip(uad), buf);
++ log_event(LOG_INFO, "Sent mail for %s (%s) uid=%d username=%s outbytes=%d",
++ from_strip(uad), buf, uid, pw->pw_name, outbytes);
+
+ return(0);
+ }
+Index: ssmtp-2.61/configure.in
+===================================================================
+--- ssmtp-2.61.orig/configure.in 2007-08-30 20:56:56.000000000 +0200
++++ ssmtp-2.61/configure.in 2007-08-30 20:56:56.000000000 +0200
+@@ -24,8 +24,8 @@
+ AC_STRUCT_TM
+
+ dnl Checks for libraries.
+-AC_CHECK_LIB(nsl, gethostname)
+-AC_CHECK_LIB(socket, socket)
++AC_SEARCH_LIBS(gethostname, nsl)
++AC_SEARCH_LIBS(socket, socket)
+
+ dnl Checks for library functions.
+ AC_TYPE_SIGNAL
--- /dev/null
+Index: ssmtp-2.61/arpadate.c
+===================================================================
+--- ssmtp-2.61.orig/arpadate.c 2007-08-30 20:56:56.000000000 +0200
++++ ssmtp-2.61/arpadate.c 2007-08-30 20:56:56.000000000 +0200
+@@ -79,7 +79,7 @@
+ time_t now;
+
+ /* RFC822 format string borrowed from GNU shellutils date.c */
+- const char *format = "%a, %_d %b %Y %H:%M:%S %z";
++ const char *format = "%a, %d %b %Y %H:%M:%S %z";
+
+ now = time(NULL);
+
--- /dev/null
+#
+# Copyright (C) 2007-2008 OpenWrt.org
+#
+# This is free software, licensed under the GNU General Public License v2.
+# See /LICENSE for more information.
+#
+# $Id$
+
+include $(TOPDIR)/rules.mk
+
+PKG_NAME:=xmail
+PKG_VERSION:=1.24
+PKG_RELEASE:=1
+
+PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
+PKG_SOURCE_URL:=http://www.xmailserver.org/
+PKG_MD5SUM:=106730bdbaa4fda9e90a7c22df024114
+
+include $(INCLUDE_DIR)/package.mk
+
+define Package/xmail
+ SECTION:=mail
+ CATEGORY:=Mail
+ DEPENDS:=+uclibcxx +libopenssl
+ TITLE:=advanced, fast and reliable ESMTP/POP3 mail server
+ URL:=http://www.xmailserver.org/
+endef
+
+define Package/xmail/description
+ XMail is an Internet mail server featuring an SMTP, POP3 and finger server.
+ It's incredibly easy to set up and has lots of features including :
+ multiple domains, virtual users and spam protection.
+endef
+
+define Build/Configure
+ $(CP) ./files/SysMachine.h $(PKG_BUILD_DIR)/
+endef
+
+define Build/Compile
+ CFLAGS="$(TARGET_CFLAGS)" \
+ $(MAKE) -C $(PKG_BUILD_DIR) -f Makefile.lnx \
+ $(TARGET_CONFIGURE_OPTS) \
+ LD="\$$$$(CC)" \
+ CPPFLAGS="$(TARGET_CPPFLAGS) -I$(STAGING_DIR)/usr/include/uClibc++ -fno-builtin -fno-rtti -nostdinc++" \
+ LDFLAGS="$(TARGET_LDFLAGS) -nodefaultlibs -lcrypto -lssl -luClibc++ -ldl -lm -lpthread" \
+ all
+endef
+
+define Package/xmail/install
+ $(INSTALL_DIR) $(1)/usr/bin/
+ $(INSTALL_BIN) $(PKG_BUILD_DIR)/bin/* $(1)/usr/bin/
+ $(INSTALL_DIR) $(1)/var/MailRoot/
+ $(CP) $(PKG_BUILD_DIR)/MailRoot $(1)/var/
+endef
+
+$(eval $(call BuildPackage,xmail))
--- /dev/null
+#ifndef _MACHDEFS_H
+#define _MACHDEFS_H
+
+
+#undef MACH_BIG_ENDIAN_WORDS
+
+#undef MACH_BIG_ENDIAN_BITFIELD
+
+typedef signed char MachInt8;
+typedef unsigned char MachUInt8;
+#define MACH_TYPE_8BIT char
+
+typedef signed short MachInt16;
+typedef unsigned short MachUInt16;
+#define MACH_TYPE_16BIT short
+
+typedef signed int MachInt32;
+typedef unsigned int MachUInt32;
+#define MACH_TYPE_32BIT int
+
+
+
+#endif
+
--- /dev/null
+--- xmail-1.24.orig/Makefile.common 2006-12-31 20:03:59.000000000 +0100
++++ xmail-1.24/Makefile.common 2007-02-01 20:41:08.000000000 +0100
+@@ -76,15 +76,15 @@
+ SENDMAILOBJS = SendMail.o
+
+ %.o : %.cpp
+- ${CC} ${CPPFLAGS} ${CFLAGS} -c $*.cpp
++ ${CXX} ${CPPFLAGS} ${CFLAGS} -c $*.cpp
+
+ all: ${OUTDIR} ${MKMACHDEPINC} ${MAILSVR} ${CRTLCLNT} ${XMCRYPT} ${MKUSERS} ${SENDMAIL}
+
+ ${OUTDIR}:
+ @mkdir ${OUTDIR}
+
+-${MKMACHDEPINC}: ${MKMACHDEP}
+- ./${MKMACHDEP} > ${MKMACHDEPINC}
++#${MKMACHDEPINC}: ${MKMACHDEP}
++# ./${MKMACHDEP} > ${MKMACHDEPINC}
+
+ ${MKMACHDEP}: ${MKMACHDEPOBJS}
+ ${LD} -o ${MKMACHDEP} ${MKMACHDEPOBJS} ${LDFLAGS}
--- /dev/null
+diff -ruaN xmail-1.24.orig/Makefile.lnx xmail-1.24/Makefile.lnx
+--- xmail-1.24.orig/Makefile.lnx 2006-12-31 20:03:59.000000000 +0100
++++ xmail-1.24/Makefile.lnx 2007-02-02 13:11:29.000000000 +0100
+@@ -19,9 +19,9 @@
+ # Davide Libenzi <davidel@xmailserver.org>
+ #
+ SYSTYPE = linux
+-CC = g++
+-LD = g++
+-STRIP = strip
++CC = $(CXX)
++LD = $(CXX)
++#STRIP = strip
+
+ ifneq ("$(WITH_SSL_INCLUDE)", "")
+ CFLAGS := $(CFLAGS) -I$(WITH_SSL_INCLUDE)
--- /dev/null
+diff -ruaN xmail-1.24.orig/xmail xmail-1.24/xmail
+--- xmail-1.24.orig/xmail 2006-12-31 20:03:59.000000000 +0100
++++ xmail-1.24/xmail 2007-02-02 13:14:39.000000000 +0100
+@@ -19,7 +19,7 @@
+ test -f $DAEMON || exit 0
+
+ set -e
+-ulimit -c 20000
++ulimit -c 10000
+
+ start_xmail()
+ {
--- /dev/null
+diff -ruN xmail-1.24-old/Makefile.common xmail-1.24-new/Makefile.common
+--- xmail-1.24-old/Makefile.common 2007-09-01 17:30:57.000000000 +0200
++++ xmail-1.24-new/Makefile.common 2007-09-01 17:34:00.000000000 +0200
+@@ -24,10 +24,10 @@
+ endif
+
+ ifeq ($(XMAIL_DEBUG), 1)
+- CFLAGS := $(CFLAGS) -O0 -g
++ CFLAGS := -O0 -g $(CFLAGS)
+ STRIP = touch
+ else
+- CFLAGS := $(CFLAGS) -O2
++ CFLAGS := -O2 $(CFLAGS)
+ endif
+
+ OUTDIR = bin
+++ /dev/null
-#
-# Copyright (C) 2006,2007 OpenWrt.org
-#
-# This is free software, licensed under the GNU General Public License v2.
-# See /LICENSE for more information.
-#
-# $Id$
-
-include $(TOPDIR)/rules.mk
-
-PKG_NAME:=dovecot
-PKG_VERSION:=1.0.beta8
-PKG_RELEASE:=1
-
-PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
-PKG_SOURCE_URL:=http://www.dovecot.org/releases/
-PKG_MD5SUM:=6a87718a86ee1ae2334c75843dd9a7df
-
-PKG_BUILD_DIR:=$(BUILD_DIR)/$(PKG_NAME)-$(PKG_VERSION)
-PKG_INSTALL_DIR:=$(PKG_BUILD_DIR)/ipkg-install
-
-include $(INCLUDE_DIR)/package.mk
-
-define Package/dovecot
- SECTION:=net
- CATEGORY:=Network
- DEPENDS:=+libopenssl
- TITLE:=An IMAP and POP3 daemon
- URL:=http://www.dovecot.org/
-endef
-
-define Package/dovecot/description
- Dovecot is a program which provides POP3 and IMAP services.
-endef
-
-define Build/Configure
- (cd $(PKG_BUILD_DIR); rm -rf config.{cache,status}; \
- autoconf \
- );
- $(call Build/Configure/Default, \
- --without-gssapi \
- --with-moduledir=/usr/lib/dovecot/modules \
- , \
- ignore_signed_size=1 \
- )
-endef
-
-define Build/Compile
- $(MAKE) -C $(PKG_BUILD_DIR) \
- DESTDIR="$(PKG_INSTALL_DIR)" \
- all install
-endef
-
-define Package/dovecot/install
- $(INSTALL_DIR) $(1)/etc/init.d
- $(INSTALL_BIN) ./files/dovecot.init $(1)/etc/init.d/dovecot
- $(INSTALL_DIR) $(1)/etc/dovecot
- $(INSTALL_DATA) ./files/dovecot.conf $(1)/etc/dovecot.conf
- $(INSTALL_DIR) $(1)/usr/lib/dovecot
- $(CP) $(PKG_INSTALL_DIR)/usr/lib/dovecot/* $(1)/usr/lib/dovecot/
- $(INSTALL_DIR) $(1)/usr/sbin
- $(INSTALL_BIN) $(PKG_INSTALL_DIR)/usr/sbin/* $(1)/usr/sbin/
- find $(1)/usr/lib/dovecot/modules/ \
- -name "*.a" -o -name "*.la" | xargs rm
-endef
-
-define Package/dovecot/conffiles
-/etc/dovecot.conf
-endef
-
-define Package/dovecot/postinst
-#!/bin/sh
-
-id=59
-name=dovecot
-home=/var/run/dovecot
-shell=/bin/false
-
-# do not change below
-# check if we are on real system
-if [ -z "$${IPKG_INSTROOT}" ]; then
- # create copies of passwd and group, if we use squashfs
- rootfs=`mount |awk '/root/ { print $$5 }'`
- if [ "$$rootfs" = "squashfs" ]; then
- if [ -h /etc/group ]; then
- rm /etc/group
- cp -p /rom/etc/group /etc/group
- fi
- if [ -h /etc/passwd ]; then
- rm /etc/passwd
- cp -p /rom/etc/passwd /etc/passwd
- fi
- fi
-fi
-
-echo ""
-if [ -z "$$(grep ^\\$${name}: $${IPKG_INSTROOT}/etc/group)" ]; then
- echo "adding group $$name to /etc/group"
- echo "$${name}:x:$${id}:" >> $${IPKG_INSTROOT}/etc/group
-fi
-if [ -z "$$(grep ^\\$${name}: $${IPKG_INSTROOT}/etc/passwd)" ]; then
- echo "adding user $$name to /etc/passwd"
- echo "$${name}:x:$${id}:$${id}:$${name}:$${home}:$${shell}" >> $${IPKG_INSTROOT}/etc/passwd
-fi
-endef
-
-
-$(eval $(call BuildPackage,dovecot))
-
-$(eval $(call RequireCommand,autoconf, \
- $(PKG_NAME) requires GNU autoconf. \
-))
+++ /dev/null
-## Dovecot configuration file
-
-# '#' character and everything after it is treated as comments. Extra spaces
-# and tabs are ignored. If you want to use either of these explicitly, put the
-# value inside quotes, eg.: key = "# char and trailing whitespace "
-
-# Default values are shown after each value, it's not required to uncomment
-# any of the lines. Exception to this are paths, they're just examples
-# with real defaults being based on configure options. The paths listed here
-# are for configure --prefix=/usr --sysconfdir=/etc --localstatedir=/var
-# --with-ssldir=/etc/ssl
-
-# Base directory where to store runtime data.
-#base_dir = /var/run/dovecot/
-
-# Protocols we want to be serving:
-# imap imaps pop3 pop3s
-#protocols = imap imaps
-protocols = imap
-
-# IP or host address where to listen in for connections. It's not currently
-# possible to specify multiple addresses. "*" listens in all IPv4 interfaces.
-# "[::]" listens in all IPv6 interfaces, but may also listen in all IPv4
-# interfaces depending on the operating system. If you want to specify ports
-# for each service, you will need to configure these settings inside the
-# protocol imap/pop3 { ... } section, so you can specify different ports
-# for IMAP/POP3.
-#listen = *
-
-# IP or host address where to listen in for SSL connections. Defaults
-# to above if not specified.
-#ssl_listen =
-
-# Disable SSL/TLS support.
-#ssl_disable = no
-ssl_disable = yes
-
-# PEM encoded X.509 SSL/TLS certificate and private key. They're opened before
-# dropping root privileges, so keep the key file unreadable by anyone but
-# root.
-#ssl_cert_file = /etc/ssl/certs/ssl-cert-snakeoil.pem
-#ssl_key_file = /etc/ssl/private/ssl-cert-snakeoil.key
-
-# If key file is password protected, give the password here. Alternatively
-# give it when starting dovecot with -p parameter.
-#ssl_key_password =
-
-# File containing trusted SSL certificate authorities. Usually not needed.
-#ssl_ca_file =
-
-# Request client to send a certificate.
-#ssl_verify_client_cert = no
-
-# How often to regenerate the SSL parameters file. Generation is quite CPU
-# intensive operation. The value is in hours, 0 disables regeneration
-# entirely.
-#ssl_parameters_regenerate = 168
-
-# SSL ciphers to use
-#ssl_cipher_list = ALL:!LOW
-
-# Disable LOGIN command and all other plaintext authentications unless
-# SSL/TLS is used (LOGINDISABLED capability). Note that 127.*.*.* and
-# IPv6 ::1 addresses are considered secure, this setting has no effect if
-# you connect from those addresses.
-disable_plaintext_auth = no
-
-# Use this logfile instead of syslog(). /dev/stderr can be used if you want to
-# use stderr for logging (ONLY /dev/stderr - otherwise it is closed).
-#log_path =
-
-# For informational messages, use this logfile instead of the default
-#info_log_path =
-
-# Prefix for each line written to log file. % codes are in strftime(3)
-# format.
-log_timestamp = "%Y-%m-%d %H:%M:%S "
-
-# Syslog facility to use if you're logging to syslog. Usually if you don't
-# want to use "mail", you'll use local0..local7. Also other standard
-# facilities are supported.
-#syslog_facility = mail
-
-##
-## Login processes
-##
-
-# Directory where authentication process places authentication UNIX sockets
-# which login needs to be able to connect to. The sockets are created when
-# running as root, so you don't have to worry about permissions. Note that
-# everything in this directory is deleted when Dovecot is started.
-#login_dir = /var/run/dovecot/login
-
-# chroot login process to the login_dir. Only reason not to do this is if you
-# wish to run the whole Dovecot without roots.
-# http://wiki.dovecot.org/Rootless
-#login_chroot = yes
-
-# User to use for the login process. Create a completely new user for this,
-# and don't use it anywhere else. The user must also belong to a group where
-# only it has access, it's used to control access for authentication process.
-# Note that this user is NOT used to access mails.
-# http://wiki.dovecot.org/UserIds
-#login_user = dovecot
-
-# Set max. process size in megabytes. If you don't use
-# login_process_per_connection you might need to grow this.
-#login_process_size = 32
-
-# Should each login be processed in it's own process (yes), or should one
-# login process be allowed to process multiple connections (no)? Yes is more
-# secure, espcially with SSL/TLS enabled. No is faster since there's no need
-# to create processes all the time.
-#login_process_per_connection = yes
-
-# Number of login processes to create. If login_process_per_connection is
-# yes, this is the number of extra processes waiting for users to log in.
-#login_processes_count = 3
-
-# Maximum number of extra login processes to create. The extra process count
-# usually stays at login_processes_count, but when multiple users start logging
-# in at the same time more extra processes are created. To prevent fork-bombing
-# we check only once in a second if new processes should be created - if all
-# of them are used at the time, we double their amount until limit set by this
-# setting is reached. This setting is used only if login_process_per_use is yes.
-#login_max_processes_count = 128
-
-# Maximum number of connections allowed in login state. When this limit is
-# reached, the oldest connections are dropped. If login_process_per_connection
-# is no, this is a per-process value, so the absolute maximum number of users
-# logging in actually login_processes_count * max_logging_users.
-#login_max_logging_users = 256
-
-# Greeting message for clients.
-#login_greeting = Dovecot ready.
-
-# Space-separated list of elements we want to log. The elements which have
-# a non-empty variable value are joined together to form a comma-separated
-# string.
-#login_log_format_elements = user=<%u> method=%m rip=%r lip=%l %c
-
-# Login log format. %$ contains login_log_format_elements string, %s contains
-# the data we want to log.
-#login_log_format = %$: %s
-
-##
-## Mail processes
-##
-
-# Maximum number of running mail processes. When this limit is reached,
-# new users aren't allowed to log in.
-#max_mail_processes = 1024
-
-# Show more verbose process titles (in ps). Currently shows user name and
-# IP address. Useful for seeing who are actually using the IMAP processes
-# (eg. shared mailboxes or if same uid is used for multiple accounts).
-#verbose_proctitle = no
-
-# Show protocol level SSL errors.
-#verbose_ssl = no
-
-# Valid UID range for users, defaults to 500 and above. This is mostly
-# to make sure that users can't log in as daemons or other system users.
-# Note that denying root logins is hardcoded to dovecot binary and can't
-# be done even if first_valid_uid is set to 0.
-#first_valid_uid = 500
-#last_valid_uid = 0
-
-# Valid GID range for users, defaults to non-root/wheel. Users having
-# non-valid GID as primary group ID aren't allowed to log in. If user
-# belongs to supplementary groups with non-valid GIDs, those groups are
-# not set.
-#first_valid_gid = 1
-#last_valid_gid = 0
-
-# Grant access to these extra groups for mail processes. Typical use would be
-# to give "mail" group write access to /var/mail to be able to create dotlocks.
-mail_extra_groups = mail
-
-# ':' separated list of directories under which chrooting is allowed for mail
-# processes (ie. /var/mail will allow chrooting to /var/mail/foo/bar too).
-# This setting doesn't affect login_chroot or auth_chroot variables.
-# WARNING: Never add directories here which local users can modify, that
-# may lead to root exploit. Usually this should be done only if you don't
-# allow shell access for users. See
-# /usr/share/doc/dovecot-common/configuration.txt for more information.
-#valid_chroot_dirs =
-
-# Default chroot directory for mail processes. This can be overridden for
-# specific users in user database by giving /./ in user's home directory
-# (eg. /home/./user chroots into /home). Note that usually there is no real
-# need to do chrooting, Dovecot doesn't allow users to access files outside
-# their mail directory anyway.
-#mail_chroot =
-
-# Enable mail process debugging. This can help you figure out why Dovecot
-# isn't finding your mails.
-#mail_debug = no
-
-# Default MAIL environment to use when it's not set. By leaving this empty
-# dovecot tries to do some automatic detection as described in
-# /usr/share/doc/dovecot-common/mail-storages.txt. There's a few special
-# variables you can use, eg.:
-#
-# %u - username
-# %n - user part in user@domain, same as %u if there's no domain
-# %d - domain part in user@domain, empty if there's no domain
-# %h - home directory
-#
-# See /usr/share/doc/dovecot-common/variables.txt for full list. Some examples:
-#
-# default_mail_env = maildir:/var/mail/%1u/%u/Maildir
-# default_mail_env = mbox:~/mail/:INBOX=/var/mail/%u
-# default_mail_env = mbox:/var/mail/%d/%n/:INDEX=/var/indexes/%d/%n
-#
-#default_mail_env =
-
-# If you need to set multiple mailbox locations or want to change default
-# namespace settings, you can do it by defining namespace sections:
-#
-# You can have private, shared and public namespaces. The only difference
-# between them is how Dovecot announces them to client via NAMESPACE
-# extension. Shared namespaces are meant for user-owned mailboxes which are
-# shared to other users, while public namespaces are for more globally
-# accessible mailboxes.
-#
-# REMEMBER: If you add any namespaces, the default namespace must be added
-# explicitly, ie. default_mail_env does nothing unless you have a namespace
-# without a location setting. Default namespace is simply done by having a
-# namespace with empty prefix.
-#namespace private {
- # Hierarchy separator to use. You should use the same separator for all
- # namespaces or some clients get confused. '/' is usually a good one.
- #separator = /
-
- # Prefix required to access this namespace. This needs to be different for
- # all namespaces. For example "Public/".
- #prefix =
-
- # Physical location of the mailbox. This is in same format as
- # default_mail_env, which is also the default for it.
- #location =
-
- # There can be only one INBOX, and this setting defines which namespace
- # has it.
- #inbox = yes
-
- # If namespace is hidden, it's not advertised to clients via NAMESPACE
- # extension or shown in LIST replies. This is mostly useful when converting
- # from another server with different namespaces which you want to depricate
- # but still keep working. For example you can create hidden namespaces with
- # prefixes "~/mail/", "~%u/mail/" and "mail/".
- #hidden = yes
-#}
-
-# Space-separated list of fields to initially save into cache file. Currently
-# these fields are allowed:
-#
-# flags, date.sent, date.received, size.virtual, size.physical
-# mime.parts, imap.body, imap.bodystructure
-#
-# Different IMAP clients work in different ways, so they benefit from
-# different cached fields. Some do not benefit from them at all. Caching more
-# than necessary generates useless disk I/O, so you don't want to do that
-# either.
-#
-# Dovecot attempts to automatically figure out what client wants and it keeps
-# only that. However the first few times a mailbox is opened, Dovecot hasn't
-# yet figured out what client needs, so it may not perform optimally. If you
-# know what fields the majority of your clients need, it may be useful to set
-# these fields by hand. If client doesn't actually use them, Dovecot will
-# eventually drop them.
-#
-# Usually you should just leave this field alone. The potential benefits are
-# typically unnoticeable.
-#mail_cache_fields =
-
-# Space-separated list of fields that Dovecot should never save to cache file.
-# Useful if you want to save disk space at the cost of more I/O when the fields
-# needed.
-#mail_never_cache_fields =
-
-# The minimum number of mails in a mailbox before updates are done to cache
-# file. This allows optimizing Dovecot's behavior to do less disk writes at
-# the cost of more disk reads.
-#mail_cache_min_mail_count = 0
-
-# When IDLE command is running, mailbox is checked once in a while to see if
-# there are any new mails or other changes. This setting defines the minimum
-# time to wait between those checks. Dovecot is however able to use dnotify
-# and inotify with Linux to reply immediately after the change occurs.
-#mailbox_idle_check_interval = 30
-
-# Allow full filesystem access to clients. There's no access checks other than
-# what the operating system does for the active UID/GID. It works with both
-# maildir and mboxes, allowing you to prefix mailboxes names with eg. /path/
-# or ~user/.
-#mail_full_filesystem_access = no
-
-# Maximum allowed length for mail keyword name. It's only forced when trying
-# to create new keywords.
-#mail_max_keyword_length = 50
-
-# Save mails with CR+LF instead of plain LF. This makes sending those mails
-# take less CPU, especially with sendfile() syscall with Linux and FreeBSD.
-# But it also creates a bit more disk I/O which may just make it slower.
-# Also note that if other software reads the mboxes/maildirs, they may handle
-# the extra CRs wrong and cause problems.
-#mail_save_crlf = no
-
-# Use mmap() instead of read() to read mail files. read() seems to be a bit
-# faster with my Linux/x86 and it's better with NFS, so that's the default.
-# Note that OpenBSD 3.3 and older don't work right with mail_read_mmaped = yes.
-#mail_read_mmaped = no
-
-# Don't use mmap() at all. This is required if you store indexes in remote
-# filesystems (NFS or clustered filesystem).
-#mmap_disable = no
-
-# Don't write() to mmaped files. This is required for some operating systems
-# which use separate caches for them, such as OpenBSD.
-#mmap_no_write = no
-
-# Locking method for index files. Alternatives are fcntl, flock and dotlock.
-# Dotlocking uses some tricks which may create more disk I/O than other locking
-# methods. NOTE: If you use NFS, remember to change also mmap_disable setting!
-# Solaris doesn't support flock, so Solaris users need to change this to fcntl.
-#lock_method = flock
-
-# By default LIST command returns all entries in maildir beginning with dot.
-# Enabling this option makes Dovecot return only entries which are directories.
-# This is done by stat()ing each entry, so it causes more disk I/O.
-# (For systems setting struct dirent->d_type, this check is free and it's
-# done always regardless of this setting)
-#maildir_stat_dirs = no
-
-# Copy mail to another folders using hard links. This is much faster than
-# actually copying the file. This is problematic only if something modifies
-# the mail in one folder but doesn't want it modified in the others. I don't
-# know any MUA which would modify mail files directly. IMAP protocol also
-# requires that the mails don't change, so it would be problematic in any case.
-# If you care about performance, enable it.
-#maildir_copy_with_hardlinks = no
-
-# Which locking methods to use for locking mbox. There's four available:
-# dotlock: Create <mailbox>.lock file. This is the oldest and most NFS-safe
-# solution. If you want to use /var/mail/ like directory, the users
-# will need write access to that directory.
-# fcntl : Use this if possible. Works with NFS too if lockd is used.
-# flock : May not exist in all systems. Doesn't work with NFS.
-# lockf : May not exist in all systems. Doesn't work with NFS.
-#
-# You can use multiple locking methods; if you do the order they're declared
-# in is important to avoid deadlocks if other MTAs/MUAs are using multiple
-# locking methods as well. Some operating systems don't allow using some of
-# them simultaneously.
-#mbox_read_locks = fcntl
-#mbox_write_locks = dotlock fcntl
-
-# Maximum time in seconds to wait for lock (all of them) before aborting.
-#mbox_lock_timeout = 300
-
-# If dotlock exists but the mailbox isn't modified in any way, override the
-# lock file after this many seconds.
-#mbox_dotlock_change_timeout = 30
-
-# When mbox changes unexpectedly we have to fully read it to find out what
-# changed. If the mbox is large this can take a long time. Since the change
-# is usually just a newly appended mail, it'd be faster to simply read the
-# new mails. If this setting is enabled, Dovecot does this but still safely
-# fallbacks to re-reading the whole mbox file whenever something in mbox isn't
-# how it's expected to be. The only real downside to this setting is that if
-# some other MUA changes message flags, Dovecot doesn't notice it immediately.
-# Note that a full sync is done with SELECT, EXAMINE, EXPUNGE and CHECK
-# commands.
-#mbox_dirty_syncs = yes
-
-# Like mbox_dirty_syncs, but don't do full syncs even with SELECT, EXAMINE,
-# EXPUNGE or CHECK commands. If this is set, mbox_dirty_syncs is ignored.
-#mbox_very_dirty_syncs = no
-
-# Delay writing mbox headers until doing a full write sync (EXPUNGE and CHECK
-# commands and when closing the mailbox). This is especially useful for POP3
-# where clients often delete all mails. The downside is that our changes
-# aren't immediately visible to other MUAs.
-#mbox_lazy_writes = yes
-
-# If mbox size is smaller than this (in kilobytes), don't write index files.
-# If an index file already exists it's still read, just not updated.
-#mbox_min_index_size = 0
-
-# Maximum dbox file size in kilobytes until it's rotated.
-#dbox_rotate_size = 2048
-
-# Minimum dbox file size in kilobytes before it's rotated
-# (overrides dbox_rotate_days)
-#dbox_rotate_min_size = 16
-
-# Maximum dbox file age in days until it's rotated. Day always begins from
-# midnight, so 1 = today, 2 = yesterday, etc. 0 = check disabled.
-#dbox_rotate_days = 0
-
-# umask to use for mail files and directories
-#umask = 0077
-
-# Drop all privileges before exec()ing the mail process. This is mostly
-# meant for debugging, otherwise you don't get core dumps. It could be a small
-# security risk if you use single UID for multiple users, as the users could
-# ptrace() each others processes then.
-#mail_drop_priv_before_exec = no
-
-# Set max. process size in megabytes. Most of the memory goes to mmap()ing
-# files, so it shouldn't harm much even if this limit is set pretty high.
-#mail_process_size = 256
-
-# Log prefix for mail processes. See
-# /usr/share/doc/dovecot-common/variables.txt for list of possible variables
-#you can use.
-#mail_log_prefix = "%Us(%u): "
-
-##
-## IMAP specific settings
-##
-
-protocol imap {
- # Login executable location.
- #login_executable = /usr/lib/dovecot/imap-login
-
- # IMAP executable location. Changing this allows you to execute other
- # binaries before the imap process is executed.
- #
- # This would write rawlogs into ~/dovecot.rawlog/ directory:
- # mail_executable = /usr/lib/dovecot/rawlog /usr/lib/dovecot/imap
- #
- # This would attach gdb into the imap process and write backtraces into
- # /tmp/gdbhelper.* files:
- # mail_executable = /usr/lib/dovecot/gdbhelper /usr/lib/dovecot/imap
- #
- #mail_executable = /usr/lib/dovecot/imap
-
- # Maximum IMAP command line length in bytes. Some clients generate very long
- # command lines with huge mailboxes, so you may need to raise this if you get
- # "Too long argument" or "IMAP command line too large" errors often.
- #imap_max_line_length = 65536
-
- # Support for dynamically loadable modules.
- #mail_use_modules = no
- #mail_modules = /usr/lib/dovecot/modules/imap
-
- # Send IMAP capabilities in greeting message. This makes it unnecessary for
- # clients to request it with CAPABILITY command, so it saves one round-trip.
- # Many clients however don't understand it and ask the CAPABILITY anyway.
- #login_greeting_capability = no
-
- # Workarounds for various client bugs:
- # delay-newmail:
- # Send EXISTS/RECENT new mail notifications only when replying to NOOP
- # and CHECK commands. Some clients ignore them otherwise, for example
- # OSX Mail. Outlook Express breaks more badly though, without this it
- # may show user "Message no longer in server" errors. Note that OE6 still
- # breaks even with this workaround if synchronization is set to
- # "Headers Only".
- # outlook-idle:
- # Outlook and Outlook Express never abort IDLE command, so if no mail
- # arrives in half a hour, Dovecot closes the connection. This is still
- # fine, except Outlook doesn't connect back so you don't see if new mail
- # arrives.
- # netscape-eoh:
- # Netscape 4.x breaks if message headers don't end with the empty "end of
- # headers" line. Normally all messages have this, but setting this
- # workaround makes sure that Netscape never breaks by adding the line if
- # it doesn't exist. This is done only for FETCH BODY[HEADER.FIELDS..]
- # commands. Note that RFC says this shouldn't be done.
- # tb-extra-mailbox-sep:
- # With mbox storage a mailbox can contain either mails or submailboxes,
- # but not both. Thunderbird separates these two by forcing server to
- # accept '/' suffix in mailbox names in subscriptions list.
- # The list is space-separated.
- #imap_client_workarounds = outlook-idle
-}
-
-##
-## POP3 specific settings
-##
-
-protocol pop3 {
- # Login executable location.
- #login_executable = /usr/lib/dovecot/pop3-login
-
- # POP3 executable location
- #mail_executable = /usr/lib/dovecot/pop3
-
- # Don't try to set mails non-recent or seen with POP3 sessions. This is
- # mostly intended to reduce disk I/O. With maildir it doesn't move files
- # from new/ to cur/, with mbox it doesn't write Status-header.
- #pop3_no_flag_updates = no
-
- # Support LAST command which exists in old POP3 specs, but has been removed
- # from new ones. Some clients still wish to use this though. Enabling this
- # makes RSET command clear all \Seen flags from messages.
- #pop3_enable_last = no
-
- # POP3 UIDL format to use. You can use following variables:
- #
- # %v - Mailbox UIDVALIDITY
- # %u - Mail UID
- # %m - MD5 sum of the mailbox headers in hex (mbox only)
- # %f - filename (maildir only)
- #
- # If you want UIDL compatibility with other POP3 servers, use:
- # UW's ipop3d : %08Xv%08Xu
- # Courier version 0 : %f
- # Courier version 1 : %u
- # Courier version 2 : %v-%u
- # Cyrus (<= 2.1.3) : %u
- # Cyrus (>= 2.1.4) : %v.%u
- # Older Dovecots : %v.%u
- #
- # Note that Outlook 2003 seems to have problems with %v.%u format which was
- # Dovecot's default, so if you're building a new server it would be a good
- # idea to change this. %08Xu%08Xv should be pretty fail-safe.
- #
- # NOTE: Nowadays this is required to be set explicitly, since the old
- # default was bad but it couldn't be changed without breaking existing
- # installations. %08Xu%08Xv will be the new default, so use it for new
- # installations.
- #
- #pop3_uidl_format =
-
- # POP3 logout format string:
- # %t - number of TOP commands
- # %T - number of bytes sent to client as a result of TOP command
- # %r - number of RETR commands
- # %R - number of bytes sent to client as a result of RETR command
- # %d - number of deleted messages
- # %m - number of messages (before deletion)
- # %s - mailbox size in bytes (before deletion)
- #pop3_logout_format = top=%t/%T, retr=%r/%R, del=%d/%m, size=%s
-
- # Support for dynamically loadable modules.
- #mail_use_modules = no
- #mail_modules = /usr/lib/dovecot/modules/pop3
-
- # Workarounds for various client bugs:
- # outlook-no-nuls:
- # Outlook and Outlook Express hang if mails contain NUL characters.
- # This setting replaces them with 0x80 character.
- # oe-ns-eoh:
- # Outlook Express and Netscape Mail breaks if end of headers-line is
- # missing. This option simply sends it if it's missing.
- # The list is space-separated.
- #pop3_client_workarounds =
-}
-
-##
-## dovecot-lda specific settings
-##
-
-# protocol lda {
- # If you wish to use plugins you need to specify plugin directory
- # For example quota enforcing is implemented by plugin
- #module_dir = /usr/local/lib/dovecot/lda
-
- # Address from LDA should send MDNs like out of quota
- # postmaster_address = postmaster@your.dom
-
- # If there is no user-specific Sieve-script, global Sieve script is
- # executed if set.
- #global_script_path =
-
- # UNIX socket path to master authentication server to find users.
- #auth_socket_path = /var/run/dovecot-auth-master
-# }
-
-##
-## Authentication processes
-##
-
-# Executable location
-#auth_executable = /usr/lib/dovecot/dovecot-auth
-
-# Set max. process size in megabytes.
-#auth_process_size = 256
-
-# Authentication cache size in kilobytes. 0 means it's disabled.
-# Note that bsdauth, PAM and vpopmail require cache_key to be set for caching
-# to be used. Also note that currently auth cache doesn't work very well if
-# you're using multiple passdbs with same usernames in them.
-#auth_cache_size = 0
-# Time to live in seconds for cached data. After this many seconds the cached
-# record is no longer used, *except* if the main database lookup returns
-# internal failure.
-#auth_cache_ttl = 3600
-
-# Space separated list of realms for SASL authentication mechanisms that need
-# them. You can leave it empty if you don't want to support multiple realms.
-# Many clients simply use the first one listed here, so keep the default realm
-# first.
-#auth_realms =
-
-# Default realm/domain to use if none was specified. This is used for both
-# SASL realms and appending @domain to username in plaintext logins.
-#auth_default_realm =
-
-# List of allowed characters in username. If the user-given username contains
-# a character not listed in here, the login automatically fails. This is just
-# an extra check to make sure user can't exploit any potential quote escaping
-# vulnerabilities with SQL/LDAP databases. If you want to allow all characters,
-# set this value to empty.
-#auth_username_chars = abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890.-_@
-
-# Username character translations before it's looked up from databases. The
-# value contains series of from -> to characters. For example "#@/@" means
-# that '#' and '/' characters are translated to '@'.
-#auth_username_translation =
-
-# Username to use for users logging in with ANONYMOUS SASL mechanism
-#auth_anonymous_username = anonymous
-
-# More verbose logging. Useful for figuring out why authentication isn't
-# working.
-#auth_verbose = no
-
-# Even more verbose logging for debugging purposes. Shows for example SQL
-# queries.
-#auth_debug = no
-
-# In case of password mismatches, log the passwords and used scheme so the
-# problem can be debugged. Requires auth_debug=yes to be set.
-#auth_debug_passwords = no
-
-# Maximum number of dovecot-auth worker processes. They're used to execute
-# blocking passdb and userdb queries (eg. MySQL and PAM). They're
-# automatically created and destroyed as needed.
-#auth_worker_max_count = 30
-
-# Kerberos keytab to use for the GSSAPI mechanism. Will use the system
-# default (usually /etc/krb5.keytab) if not specified.
-#auth_krb5_keytab =
-
-auth default {
- # Space separated list of wanted authentication mechanisms:
- # plain digest-md5 cram-md5 apop anonymous gssapi
- mechanisms = plain
-
- ##
- ## dovecot-lda specific settings
- ##
- # socket listen {
- # master {
- # path = /var/run/dovecot-auth-master
- # mode = 0600
- # user = vmail # User running Dovecot LDA
- # #group = mail # Or alternatively mode 0660 + LDA user in this group
- # }
- # }
-
- #
- # Password database is used to verify user's password (and nothing more).
- # You can have multiple passdbs and userdbs. This is useful if you want to
- # allow both system users (/etc/passwd) and virtual users to login without
- # duplicating the system users into virtual database.
- #
- # http://wiki.dovecot.org/Authentication
- #
-
- # Users can be temporarily disabled by adding a passdb with deny=yes.
- # If the user is found from that database, authentication will fail.
- # The deny passdb should always be specified before others, so it gets
- # checked first. Here's an example:
- #passdb passwd-file {
- # File contains a list of usernames, one per line
- #args = /etc/dovecot.deny
- #deny = yes
- #}
-
- # PAM authentication. Preferred nowadays by most systems.
- # Note that PAM can only be used to verify if user's password is correct,
- # so it can't be used as userdb. If you don't want to use a separate user
- # database (passwd usually), you can use static userdb.
-# passdb pam {
- # [session=yes] [cache_key=<key>] [<service name>]
- #
- # session=yes makes Dovecot open and immediately close PAM session. Some
- # PAM plugins need this to work, such as pam_mkhomedir.
- #
- # cache_key can be used to enable authentication caching for PAM
- # (auth_cache_size also needs to be set). It isn't enabled by default
- # because PAM modules can do all kinds of checks besides checking password,
- # such as checking IP address. Dovecot can't know about these checks
- # without some help. cache_key is simply a list of variables (see
- # /usr/share/doc/dovecot-common/variables.txt) which must match for the
- # cached data to be used.
- # Here are some examples:
- # %u - Username must match. Probably sufficient for most uses.
- # %u%r - Username and remote IP address must match.
- # %u%s - Username and service (ie. IMAP, POP3) must match.
- #
- # If service name is "*", it means the authenticating service name
- # is used, eg. pop3 or imap.
- #
- # Some examples:
- # args = session=yes *
- # args = cache_key=%u dovecot
- #args = dovecot
-# }
-
- # /etc/passwd or similar, using getpwnam()
- # In many systems nowadays this uses Name Service Switch, which is
- # configured in /etc/nsswitch.conf.
- passdb passwd {
- }
-
- # /etc/shadow or similiar, using getspnam(). Deprecated by PAM nowadays.
- #passdb shadow {
- #}
-
- # BSD authentication. Used by at least OpenBSD.
- #passdb bsdauth {
- # [cache_key=<key>] - See cache_key in PAM for explanation.
- #args =
- #}
-
- # passwd-like file with specified location
- #passdb passwd-file {
- # Path for passwd-file
- #args =
- #}
-
- # checkpassword executable authentication
- # NOTE: You will probably want to use "userdb prefetch" with this.
- #passdb checkpassword {
- # Path for checkpassword binary
- #args =
- #}
-
- # SQL database
- #passdb sql {
- # Path for SQL configuration file, see /etc/dovecot/dovecot-sql.conf for
- # example
- #args =
- #}
-
- # LDAP database
- #passdb ldap {
- # Path for LDAP configuration file, see /etc/dovecot/dovecot-ldap.conf for
- # example
- #args =
- #}
-
- # vpopmail authentication
- #passdb vpopmail {
- # [cache_key=<key>] - See cache_key in PAM for explanation.
- #args =
- #}
-
- #
- # User database specifies where mails are located and what user/group IDs
- # own them. For single-UID configuration use "static".
- #
- # http://wiki.dovecot.org/Authentication
- # http://wiki.dovecot.org/VirtualUsers
- #
-
- # /etc/passwd or similar, using getpwnam()
- # In many systems nowadays this uses Name Service Switch, which is
- # configured in /etc/nsswitch.conf.
- userdb passwd {
- }
-
- # passwd-like file with specified location
- #userdb passwd-file {
- # Path for passwd-file
- #args =
- #}
-
- # static settings generated from template
- #userdb static {
- # Template for settings. Can return anything a userdb could normally
- # return, eg.: uid, gid, home, mail, nice
- #
- # A few examples:
- #
- # args = uid=500 gid=500 home=/var/mail/%u
- # args = uid=500 gid=500 home=/home/%u mail=mbox:/home/%u/mail nice=10
- #
- #args =
- #}
-
- # SQL database
- #userdb sql {
- # Path for SQL configuration file, see /etc/dovecot/dovecot-sql.conf for
- # example
- #args =
- #}
-
- # LDAP database
- #userdb ldap {
- # Path for LDAP configuration file, see /etc/dovecot/dovecot-ldap.conf for
- # example
- #args =
- #}
-
- # vpopmail
- #userdb vpopmail {
- #}
-
- # "prefetch" user database means that the passdb already provided the
- # needed information and there's no need to do a separate userdb lookup.
- # This can be made to work with SQL and LDAP databases, see their example
- # configuration files for more information how to do it.
- # http://wiki.dovecot.org/AuthSpecials
- #userdb prefetch {
- #}
-
- # User to use for the process. This user needs access to only user and
- # password databases, nothing else. Only shadow and pam authentication
- # requires roots, so use something else if possible. Note that passwd
- # authentication with BSDs internally accesses shadow files, which also
- # requires roots. Note that this user is NOT used to access mails.
- # That user is specified by userdb above.
- user = root
-
- # Directory where to chroot the process. Most authentication backends don't
- # work if this is set, and there's no point chrooting if auth_user is root.
- # Note that valid_chroot_dirs isn't needed to use this setting.
- #chroot =
-
- # Number of authentication processes to create
- #count = 1
-
- # Require a valid SSL client certificate or the authentication fails.
- #ssl_require_client_cert = no
-
- # Take the username from client's SSL certificate, using X509_NAME_oneline()
- # which typically uses subject's Distinguished Name.
- #ssl_username_from_cert = no
-}
-
-# It's possible to export the authentication interface to other programs,
-# for example SMTP server which supports talking to Dovecot. Client socket
-# handles the actual authentication - you give it a username and password
-# and it returns OK or failure. So it's pretty safe to allow anyone access to
-# it. Master socket is used to a) query if given client was successfully
-# authenticated, b) userdb lookups.
-
-# listener sockets will be created by Dovecot's master process using the
-# settings given inside the auth section
-#auth default_with_listener {
-# mechanisms = plain
-# passdb pam {
-# }
-# userdb passwd {
-# }
-# socket listen {
-# master {
-# path = /var/run/dovecot-auth-master
-# # WARNING: Giving untrusted users access to master socket may be a
-# # security risk, don't give too wide permissions to it!
-# #mode = 0600
-# # Default user/group is the one who started dovecot-auth (root)
-# #user =
-# #group =
-# }
-# client {
-# path = /var/run/dovecot-auth-client
-# mode = 0660
-# }
-# }
-#}
-
-# connect sockets are assumed to be already running, Dovecot's master
-# process only tries to connect to them. They don't need any other settings
-# than path for the master socket, as the configuration is done elsewhere.
-# Note that the client sockets must exist in login_dir.
-#auth external {
-# socket connect {
-# master {
-# path = /var/run/dovecot-auth-master
-# }
-# }
-#}
-
-plugin {
- # Here you can give some extra environment variables to mail processes.
- # This is mostly meant for passing parameters to plugins. %variable
- # expansion is done for all values.
-
- # Quota plugin
- #quota = dirsize:%h/mail
-
- # Convert plugin. If set, specifies the source storage path which is
- # converted to destination storage (default_mail_env).
- #convert_mail = mbox:%h/mail
-}
+++ /dev/null
-#!/bin/sh /etc/rc.common
-# Copyright (C) 2006,2007 OpenWrt.org
-
-START=99
-
-RUN_D=/var/run/dovecot
-PID_F=$RUN_D/master.pid
-
-start() {
- mkdir -p $RUN_D
- dovecot
-}
-
-stop() {
- [ -f $PID_F ] && kill $(cat $PID_F)
-}
+++ /dev/null
---- ./configure.in.dovecot 2005-07-30 23:44:48.571463846 +0100
-+++ ./configure.in 2005-07-31 00:22:17.564381142 +0100
-@@ -529,7 +529,22 @@
- echo "..ignoring as requested.."
- ],[
- AC_MSG_RESULT(no)
--],[])
-+],[
-+
-+ AC_MSG_RESULT(can't check)
-+
-+ echo
-+ echo "You are cross compiling so I can't tell if the destination uses a signed"
-+ echo "size_t. Dovecot isn't designed to work with a signed size_t, It probably"
-+ echo "works just fine, but it's less resistant to buffer overflows."
-+ echo "You may want to manually check what your target uses for size_t."
-+ echo "To compile Dovecot anyway, set ignore_signed_size=1 environment."
-+
-+ if test "$ignore_signed_size" = ""; then
-+ AC_MSG_ERROR([aborting])
-+ fi
-+ echo "..proceeding as requested.."
-+])
-
- dnl Note: we check size_t rather than ssize_t here, because on OSX 10.2
- dnl ssize_t = int and size_t = unsigned long. We're mostly concerned about
-@@ -659,7 +674,10 @@
- ], [
- AC_MSG_RESULT([check failed, assuming 31])
- max_bits=31
--],[])
-+],[
-+ AC_MSG_RESULT([cross compiling, assuming 31])
-+ max_bits=31
-+])
- AC_DEFINE_UNQUOTED(TIME_T_MAX_BITS, $max_bits, max. time_t bits gmtime() can handle)
-
- dnl * do we have struct iovec
-@@ -768,6 +786,8 @@
- ], [
- AC_MSG_RESULT(no)
- AC_DEFINE(MMAP_CONFLICTS_WRITE,, [Define if shared mmaps don't get updated by write()s])
-+], [
-+ AC_MSG_RESULT(cross-compiling so target PROBABLY isn't the buggy version of OpenBSD)
- ])
-
- dnl * see if fd passing works
-@@ -831,6 +851,9 @@
- if test $i = 2; then
- AC_MSG_RESULT(no)
- fi
-+ ], [
-+ CFLAGS=$old_cflags
-+ AC_MSG_RESULT(cross compiling so target probably isn't 64 bit)
- ])
- done
-
-@@ -878,7 +901,7 @@
- dnl ***
-
- AC_CACHE_CHECK([for an implementation of va_copy()],lib_cv_va_copy,[
-- AC_RUN_IFELSE([AC_LANG_SOURCE([[
-+ AC_LINK_IFELSE([AC_LANG_SOURCE([[
- #include <stdarg.h>
- void f (int i, ...) {
- va_list args1, args2;
-@@ -896,7 +919,7 @@
- [lib_cv_va_copy=no],[])
- ])
- AC_CACHE_CHECK([for an implementation of __va_copy()],lib_cv___va_copy,[
-- AC_RUN_IFELSE([AC_LANG_SOURCE([[
-+ AC_LINK_IFELSE([AC_LANG_SOURCE([[
- #include <stdarg.h>
- void f (int i, ...) {
- va_list args1, args2;
-@@ -941,7 +964,8 @@
- return 0;
- }]])],
- [lib_cv_va_val_copy=yes],
-- [lib_cv_va_val_copy=no],[])
-+ [lib_cv_va_val_copy=no],
-+ [lib_cv_va_val_copy=yes])
- ])
-
- if test "x$lib_cv_va_val_copy" = "xno"; then
+++ /dev/null
-#
-# Copyright (C) 2006 OpenWrt.org
-#
-# This is free software, licensed under the GNU General Public License v2.
-# See /LICENSE for more information.
-#
-# $Id$
-
-include $(TOPDIR)/rules.mk
-
-PKG_NAME:=imapfilter
-PKG_VERSION:=1.2.2
-PKG_RELEASE:=1
-
-PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
-PKG_SOURCE_URL:=http://imapfilter.hellug.gr/source/
-PKG_MD5SUM:=4c1f28dffbb727a4769948f10baccd79
-
-PKG_BUILD_DIR:=$(BUILD_DIR)/$(PKG_NAME)-$(PKG_VERSION)
-PKG_INSTALL_DIR:=$(PKG_BUILD_DIR)/ipkg-install
-
-include $(INCLUDE_DIR)/package.mk
-
-define Package/imapfilter
- SECTION:=net
- CATEGORY:=Network
- DEPENDS:=+liblua +libopenssl
- TITLE:=IMAP server based email filtering
- URL:=http://imapfilter.hellug.gr/
-endef
-
-define Build/Configure
- (cd $(PKG_BUILD_DIR); \
- ./configure \
- -d /usr \
- );
-endef
-
-define Build/Compile
- $(MAKE) -C $(PKG_BUILD_DIR) \
- $(TARGET_CONFIGURE_OPTS) \
- INCDIRS="-I$(STAGING_DIR)/usr/include -I$(STAGING_DIR)/include" \
- LIBDIRS="-L$(STAGING_DIR)/usr/lib -L$(STAGING_DIR)/lib" \
- MYCFLAGS="$(TARGET_CFLAGS)"
-endef
-
-define Package/imapfilter/conffiles
-/etc/imapfilter/config.lua
-endef
-
-define Package/imapfilter/install
- $(INSTALL_DIR) $(1)/usr/bin
- $(INSTALL_BIN) $(PKG_BUILD_DIR)/imapfilter $(1)/usr/bin/
- $(INSTALL_DIR) $(1)/etc/imapfilter
- $(INSTALL_CONF) $(PKG_BUILD_DIR)/sample.config.lua $(1)/etc/imapfilter/config.lua
- $(INSTALL_DIR) $(1)/usr/share/imapfilter
- $(INSTALL_DATA) $(PKG_BUILD_DIR)/interface.lua $(1)/usr/share/imapfilter/
- $(INSTALL_DATA) $(PKG_BUILD_DIR)/auxiliary.lua $(1)/usr/share/imapfilter/
-endef
-
-$(eval $(call BuildPackage,imapfilter))
+++ /dev/null
---- imapfilter-1.2.2/pathnames.h 2006-08-01 14:11:20.000000000 +0200
-+++ imapfilter-1.2.2/pathnames.h 2006-09-07 23:58:12.000000000 +0200
-@@ -3,7 +3,7 @@
-
-
- /* Program's home directory. */
--#define PATHNAME_HOME ".imapfilter"
-+#define PATHNAME_HOME "/etc/imapfilter"
-
- /* Program's configuration file. */
- #define PATHNAME_CONFIG PATHNAME_HOME "/config.lua"
-@@ -18,7 +18,7 @@
- #define PATHNAME_CERTS PATHNAME_HOME "/certificates"
-
- /* Debug temporary file template. */
--#define PATHNAME_DEBUG PATHNAME_HOME "/debug.XXXXXX"
-+#define PATHNAME_DEBUG "/tmp/imapfilterdebug.XXXXXX"
-
-
- #endif /* PATHNAMES_H */
---- imapfilter-1.2.2/imapfilter.c 2006-09-08 00:02:11.000000000 +0200
-+++ imapfilter-1.2.2/imapfilter.c 2006-09-08 00:02:32.000000000 +0200
-@@ -50,7 +50,7 @@
- opts.config = NULL;
- opts.oneline = NULL;
-
-- env.home = getenv("HOME");
-+ env.home = "";
- env.pathmax = -1;
-
- while ((c = getopt(argc, argv, "Vc:de:il:v?")) != -1) {
+++ /dev/null
-#
-# Copyright (C) 2007 OpenWrt.org
-#
-# This is free software, licensed under the GNU General Public License v2.
-# See /LICENSE for more information.
-#
-# $Id$
-
-include $(TOPDIR)/rules.mk
-
-PKG_NAME:=mini-sendmail
-PKG_VERSION:=1.3.6
-PKG_RELEASE:=2
-
-PKG_SOURCE:=mini_sendmail-$(PKG_VERSION).tar.gz
-PKG_SOURCE_URL:=http://www.acme.com/software/mini_sendmail/
-PKG_MD5SUM:=fb1585d2ad81c519a26d83bfd783dee8
-
-PKG_BUILD_DIR:=$(BUILD_DIR)/mini_sendmail-$(PKG_VERSION)
-
-include $(INCLUDE_DIR)/package.mk
-
-define Package/mini-sendmail
- SECTION:=net
- CATEGORY:=Network
- TITLE:=A small sendmail-compatible mail forwarder
- URL:=http://www.acme.com/software/mini_sendmail/
-endef
-
-define Package/mini-sendmail/description
- mini_sendmail reads its standard input up to an end-of-file and sends a
- copy of the message found there to all of the addresses listed.
- The message is sent by connecting to a local SMTP server. This means
- mini_sendmail can be used to send email from inside a chroot(2) area.
-endef
-
-MAKE_FLAGS += \
- OFLAGS="$(TARGET_CFLAGS)"
-
-define Package/mini-sendmail/install
- $(INSTALL_DIR) $(1)/usr/sbin
- $(INSTALL_BIN) $(PKG_BUILD_DIR)/mini_sendmail $(1)/usr/sbin/
- ln -sf mini_sendmail $(1)/usr/sbin/sendmail
-endef
-
-$(eval $(call BuildPackage,mini-sendmail))
+++ /dev/null
-Index: mini_sendmail-1.3.6/mini_sendmail.c
-===================================================================
---- mini_sendmail-1.3.6.orig/mini_sendmail.c 2007-08-28 17:58:37.000000000 +0200
-+++ mini_sendmail-1.3.6/mini_sendmail.c 2007-08-28 17:58:37.000000000 +0200
-@@ -542,6 +542,7 @@
- }
-
- /* Strip off any angle brackets. */
-+/*
- while ( len > 0 && *recipient == '<' )
- {
- ++recipient;
-@@ -551,6 +552,23 @@
- --len;
-
- (void) snprintf( buf, sizeof(buf), "RCPT TO:<%.*s>", len, recipient );
-+*/
-+ if (len > 0 && recipient[len-1] == '>' )
-+ {
-+ /* "<name@domain>" or: "Full Name <name@domain>" */
-+ while (len > 0 && *recipient != '<' )
-+ {
-+ ++recipient;
-+ --len;
-+ }
-+ (void) snprintf( buf, sizeof(buf), "RCPT TO:%.*s", len, recipient );
-+ }
-+ else
-+ {
-+ /* name@domain */
-+ (void) snprintf( buf, sizeof(buf), "RCPT TO:<%.*s>", len, recipient );
-+ }
-+
- send_command( buf );
- status = read_response();
- if ( status != 250 && status != 251 )
+++ /dev/null
-Index: mini_sendmail-1.3.6/Makefile
-===================================================================
---- mini_sendmail-1.3.6.orig/Makefile 2007-08-28 17:58:37.000000000 +0200
-+++ mini_sendmail-1.3.6/Makefile 2007-08-28 17:58:37.000000000 +0200
-@@ -7,9 +7,10 @@
- BINDIR = /usr/local/sbin
- MANDIR = /usr/local/man
- CC = gcc
--CFLAGS = -O
-+OFLAGS = -O
-+CFLAGS = $(OFLAGS)
- #CFLAGS = -g
--LDFLAGS = -s -static
-+LDFLAGS =
- #LDFLAGS = -g -static
- LDLIBS = $(SYSV_LIBS)
-
+++ /dev/null
-#
-# Copyright (C) 2007 OpenWrt.org
-#
-# This is free software, licensed under the GNU General Public License v2.
-# See /LICENSE for more information.
-#
-# $Id$
-
-include $(TOPDIR)/rules.mk
-
-PKG_NAME:=ssmtp
-PKG_VERSION:=2.61
-PKG_RELEASE:=2
-
-PKG_SOURCE:=$(PKG_NAME)_$(PKG_VERSION).orig.tar.gz
-PKG_SOURCE_URL:=http://ftp.debian.org/debian/pool/main/s/ssmtp/
-PKG_MD5SUM:=957e6fff08625fe34f4fc33d0925bbc9
-
-include $(INCLUDE_DIR)/package.mk
-
-define Package/ssmtp
- SECTION:=net
- CATEGORY:=Network
- DEPENDS:=+libopenssl
- TITLE:=A minimal and secure mail sender
- URL:=http://packages.debian.org/stable/mail/ssmtp
-endef
-
-define Package/ssmtp/description
- A secure, effective and simple way of getting mail off a system to your
- mail hub. It contains no suid-binaries or other dangerous things - no
- mail spool to poke around in, and no daemons running in the background.
- mail is simply forwarded to the configured mailhost. Extremely easy
- configuration.
-endef
-
-EXTRA_CFLAGS+=-I$(STAGING_DIR)/usr/include -I$(STAGING_DIR)/include
-EXTRA_LDFLAGS+=-L$(STAGING_DIR)/usr/lib -Wl,-rpath-link,$(STAGING_DIR)/usr/lib
-
-TARGET_CONFIGURE_OPTS+=\
- CC="$(TARGET_CC) $(EXTRA_CFLAGS) $(EXTRA_LDFLAGS)"
-
-CONFIGURE_ARGS += \
- --enable-ssl
-
-define Package/ssmtp/install
- $(INSTALL_DIR) $(1)/etc/ssmtp
- $(INSTALL_DATA) $(PKG_BUILD_DIR)/ssmtp.conf $(1)/etc/ssmtp/
- $(INSTALL_DATA) $(PKG_BUILD_DIR)/revaliases $(1)/etc/ssmtp/
- $(INSTALL_DIR) $(1)/usr/sbin
- $(INSTALL_BIN) $(PKG_BUILD_DIR)/ssmtp $(1)/usr/sbin/
- ln -sf ssmtp $(1)/usr/sbin/sendmail
-endef
-
-$(eval $(call BuildPackage,ssmtp))
+++ /dev/null
-Index: ssmtp-2.61/ssmtp.conf
-===================================================================
---- ssmtp-2.61.orig/ssmtp.conf 2007-08-30 20:56:56.000000000 +0200
-+++ ssmtp-2.61/ssmtp.conf 2007-08-30 20:56:56.000000000 +0200
-@@ -36,3 +36,8 @@
-
- # Use this RSA certificate.
- #TLSCert=/etc/ssl/certs/ssmtp.pem
-+
-+# Get enhanced (*really* enhanced) debugging information in the logs
-+# If you want to have debugging of the config file parsing, move this option
-+# to the top of the config file and uncomment
-+#Debug=YES
-Index: ssmtp-2.61/ssmtp.c
-===================================================================
---- ssmtp-2.61.orig/ssmtp.c 2007-08-30 20:56:56.000000000 +0200
-+++ ssmtp-2.61/ssmtp.c 2007-08-30 20:56:56.000000000 +0200
-@@ -93,6 +93,7 @@
- static char hextab[]="0123456789abcdef";
- #endif
-
-+ssize_t outbytes;
-
- /*
- log_event() -- Write event to syslog (or log file if defined)
-@@ -129,7 +130,7 @@
- #endif
- }
-
--void smtp_write(int fd, char *format, ...);
-+ssize_t smtp_write(int fd, char *format, ...);
- int smtp_read(int fd, char *response);
- int smtp_read_all(int fd, char *response);
- int smtp_okay(int fd, char *response);
-@@ -150,7 +151,7 @@
- if(isatty(fileno(stdin))) {
- if(log_level > 0) {
- log_event(LOG_ERR,
-- "stdin is a TTY - not saving to %s/dead.letter, pw->pw_dir");
-+ "stdin is a TTY - not saving to %s/dead.letter", pw->pw_dir);
- }
- return;
- }
-@@ -964,6 +965,17 @@
- log_event(LOG_INFO, "Set AuthMethod=\"%s\"\n", auth_method);
- }
- }
-+ else if (strcasecmp(p, "Debug") == 0)
-+ {
-+ if (strcasecmp(q, "YES") == 0)
-+ {
-+ log_level = 1;
-+ }
-+ else
-+ {
-+ log_level = 0;
-+ }
-+ }
- else {
- log_event(LOG_INFO, "Unable to set %s=\"%s\"\n", p, q);
- }
-@@ -1232,10 +1244,11 @@
- /*
- smtp_write() -- A printf to an fd and append <CR/LF>
- */
--void smtp_write(int fd, char *format, ...)
-+ssize_t smtp_write(int fd, char *format, ...)
- {
- char buf[(BUF_SZ + 1)];
- va_list ap;
-+ ssize_t outbytes = 0;
-
- va_start(ap, format);
- if(vsnprintf(buf, (BUF_SZ - 2), format, ap) == -1) {
-@@ -1252,7 +1265,9 @@
- }
- (void)strcat(buf, "\r\n");
-
-- (void)fd_puts(fd, buf, strlen(buf));
-+ outbytes = fd_puts(fd, buf, strlen(buf));
-+
-+ return (outbytes >= 0) ? outbytes : 0;
- }
-
- /*
-@@ -1282,6 +1297,8 @@
- int i, sock;
- uid_t uid;
-
-+ outbytes = 0;
-+
- uid = getuid();
- if((pw = getpwuid(uid)) == (struct passwd *)NULL) {
- die("Could not find password entry for UID %d", uid);
-@@ -1335,10 +1352,10 @@
-
- /* If user supplied username and password, then try ELHO */
- if(auth_user) {
-- smtp_write(sock, "EHLO %s", hostname);
-+ outbytes += smtp_write(sock, "EHLO %s", hostname);
- }
- else {
-- smtp_write(sock, "HELO %s", hostname);
-+ outbytes += smtp_write(sock, "HELO %s", hostname);
- }
- (void)alarm((unsigned) MEDWAIT);
-
-@@ -1354,7 +1371,7 @@
- }
-
- if(strcasecmp(auth_method, "cram-md5") == 0) {
-- smtp_write(sock, "AUTH CRAM-MD5");
-+ outbytes += smtp_write(sock, "AUTH CRAM-MD5");
- (void)alarm((unsigned) MEDWAIT);
-
- if(smtp_read(sock, buf) != 3) {
-@@ -1369,7 +1386,7 @@
- #endif
- memset(buf, 0, sizeof(buf));
- to64frombits(buf, auth_user, strlen(auth_user));
-- smtp_write(sock, "AUTH LOGIN %s", buf);
-+ outbytes += smtp_write(sock, "AUTH LOGIN %s", buf);
-
- (void)alarm((unsigned) MEDWAIT);
- if(smtp_read(sock, buf) != 3) {
-@@ -1381,7 +1398,7 @@
- #ifdef MD5AUTH
- }
- #endif
-- smtp_write(sock, "%s", buf);
-+ outbytes += smtp_write(sock, "%s", buf);
- (void)alarm((unsigned) MEDWAIT);
-
- if(smtp_okay(sock, buf) == False) {
-@@ -1390,7 +1407,7 @@
- }
-
- /* Send "MAIL FROM:" line */
-- smtp_write(sock, "MAIL FROM:<%s>", uad);
-+ outbytes += smtp_write(sock, "MAIL FROM:<%s>", uad);
-
- (void)alarm((unsigned) MEDWAIT);
-
-@@ -1408,7 +1425,7 @@
-
- while(rt->next) {
- p = rcpt_remap(rt->string);
-- smtp_write(sock, "RCPT TO:<%s>", p);
-+ outbytes += smtp_write(sock, "RCPT TO:<%s>", p);
-
- (void)alarm((unsigned)MEDWAIT);
-
-@@ -1425,7 +1442,7 @@
- while(p) {
- /* RFC822 Address -> "foo@bar" */
- q = rcpt_remap(addr_parse(p));
-- smtp_write(sock, "RCPT TO:<%s>", q);
-+ outbytes += smtp_write(sock, "RCPT TO:<%s>", q);
-
- (void)alarm((unsigned) MEDWAIT);
-
-@@ -1439,7 +1456,7 @@
- }
-
- /* Send DATA */
-- smtp_write(sock, "DATA");
-+ outbytes += smtp_write(sock, "DATA");
- (void)alarm((unsigned) MEDWAIT);
-
- if(smtp_read(sock, buf) != 3) {
-@@ -1447,45 +1464,45 @@
- die("%s", buf);
- }
-
-- smtp_write(sock,
-+ outbytes += smtp_write(sock,
- "Received: by %s (sSMTP sendmail emulation); %s", hostname, arpadate);
-
- if(have_from == False) {
-- smtp_write(sock, "From: %s", from);
-+ outbytes += smtp_write(sock, "From: %s", from);
- }
-
- if(have_date == False) {
-- smtp_write(sock, "Date: %s", arpadate);
-+ outbytes += smtp_write(sock, "Date: %s", arpadate);
- }
-
- #ifdef HASTO_OPTION
- if(have_to == False) {
-- smtp_write(sock, "To: postmaster");
-+ outbytes += smtp_write(sock, "To: postmaster");
- }
- #endif
-
- ht = &headers;
- while(ht->next) {
-- smtp_write(sock, "%s", ht->string);
-+ outbytes += smtp_write(sock, "%s", ht->string);
- ht = ht->next;
- }
-
- (void)alarm((unsigned) MEDWAIT);
-
- /* End of headers, start body */
-- smtp_write(sock, "");
-+ outbytes += smtp_write(sock, "");
-
- while(fgets(buf, sizeof(buf), stdin)) {
- /* Trim off \n, double leading .'s */
- standardise(buf);
-
-- smtp_write(sock, "%s", buf);
-+ outbytes += smtp_write(sock, "%s", buf);
-
- (void)alarm((unsigned) MEDWAIT);
- }
- /* End of body */
-
-- smtp_write(sock, ".");
-+ outbytes += smtp_write(sock, ".");
- (void)alarm((unsigned) MAXWAIT);
-
- if(smtp_okay(sock, buf) == 0) {
-@@ -1495,11 +1512,12 @@
- /* Close conection */
- (void)signal(SIGALRM, SIG_IGN);
-
-- smtp_write(sock, "QUIT");
-+ outbytes += smtp_write(sock, "QUIT");
- (void)smtp_okay(sock, buf);
- (void)close(sock);
-
-- log_event(LOG_INFO, "Sent mail for %s (%s)", from_strip(uad), buf);
-+ log_event(LOG_INFO, "Sent mail for %s (%s) uid=%d username=%s outbytes=%d",
-+ from_strip(uad), buf, uid, pw->pw_name, outbytes);
-
- return(0);
- }
-Index: ssmtp-2.61/configure.in
-===================================================================
---- ssmtp-2.61.orig/configure.in 2007-08-30 20:56:56.000000000 +0200
-+++ ssmtp-2.61/configure.in 2007-08-30 20:56:56.000000000 +0200
-@@ -24,8 +24,8 @@
- AC_STRUCT_TM
-
- dnl Checks for libraries.
--AC_CHECK_LIB(nsl, gethostname)
--AC_CHECK_LIB(socket, socket)
-+AC_SEARCH_LIBS(gethostname, nsl)
-+AC_SEARCH_LIBS(socket, socket)
-
- dnl Checks for library functions.
- AC_TYPE_SIGNAL
+++ /dev/null
-Index: ssmtp-2.61/arpadate.c
-===================================================================
---- ssmtp-2.61.orig/arpadate.c 2007-08-30 20:56:56.000000000 +0200
-+++ ssmtp-2.61/arpadate.c 2007-08-30 20:56:56.000000000 +0200
-@@ -79,7 +79,7 @@
- time_t now;
-
- /* RFC822 format string borrowed from GNU shellutils date.c */
-- const char *format = "%a, %_d %b %Y %H:%M:%S %z";
-+ const char *format = "%a, %d %b %Y %H:%M:%S %z";
-
- now = time(NULL);
-
+++ /dev/null
-#
-# Copyright (C) 2007 OpenWrt.org
-#
-# This is free software, licensed under the GNU General Public License v2.
-# See /LICENSE for more information.
-#
-# $Id$
-
-include $(TOPDIR)/rules.mk
-
-PKG_NAME:=xmail
-PKG_VERSION:=1.24
-PKG_RELEASE:=1
-
-PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
-PKG_SOURCE_URL:=http://www.xmailserver.org/
-PKG_MD5SUM:=106730bdbaa4fda9e90a7c22df024114
-
-include $(INCLUDE_DIR)/package.mk
-
-define Package/xmail
- SECTION:=net
- CATEGORY:=Network
- DEPENDS:=+uclibcxx +libopenssl
- TITLE:=advanced, fast and reliable ESMTP/POP3 mail server
- URL:=http://www.xmailserver.org/
-endef
-
-define Package/xmail/description
- XMail is an Internet mail server featuring an SMTP, POP3 and finger server.
- It's incredibly easy to set up and has lots of features including :
- multiple domains, virtual users and spam protection.
-endef
-
-define Build/Configure
- $(CP) ./files/SysMachine.h $(PKG_BUILD_DIR)/
-endef
-
-define Build/Compile
- CFLAGS="$(TARGET_CFLAGS)" \
- $(MAKE) -C $(PKG_BUILD_DIR) -f Makefile.lnx \
- $(TARGET_CONFIGURE_OPTS) \
- LD="\$$$$(CC)" \
- CPPFLAGS="$(TARGET_CPPFLAGS) -I$(STAGING_DIR)/usr/include/uClibc++ -fno-builtin -fno-rtti -nostdinc++" \
- LDFLAGS="$(TARGET_LDFLAGS) -nodefaultlibs -lcrypto -lssl -luClibc++ -ldl -lm -lpthread" \
- all
-endef
-
-define Package/xmail/install
- $(INSTALL_DIR) $(1)/usr/bin/
- $(INSTALL_BIN) $(PKG_BUILD_DIR)/bin/* $(1)/usr/bin/
- $(INSTALL_DIR) $(1)/var/MailRoot/
- $(CP) $(PKG_BUILD_DIR)/MailRoot $(1)/var/
-endef
-
-$(eval $(call BuildPackage,xmail))
+++ /dev/null
-#ifndef _MACHDEFS_H
-#define _MACHDEFS_H
-
-
-#undef MACH_BIG_ENDIAN_WORDS
-
-#undef MACH_BIG_ENDIAN_BITFIELD
-
-typedef signed char MachInt8;
-typedef unsigned char MachUInt8;
-#define MACH_TYPE_8BIT char
-
-typedef signed short MachInt16;
-typedef unsigned short MachUInt16;
-#define MACH_TYPE_16BIT short
-
-typedef signed int MachInt32;
-typedef unsigned int MachUInt32;
-#define MACH_TYPE_32BIT int
-
-
-
-#endif
-
+++ /dev/null
---- xmail-1.24.orig/Makefile.common 2006-12-31 20:03:59.000000000 +0100
-+++ xmail-1.24/Makefile.common 2007-02-01 20:41:08.000000000 +0100
-@@ -76,15 +76,15 @@
- SENDMAILOBJS = SendMail.o
-
- %.o : %.cpp
-- ${CC} ${CPPFLAGS} ${CFLAGS} -c $*.cpp
-+ ${CXX} ${CPPFLAGS} ${CFLAGS} -c $*.cpp
-
- all: ${OUTDIR} ${MKMACHDEPINC} ${MAILSVR} ${CRTLCLNT} ${XMCRYPT} ${MKUSERS} ${SENDMAIL}
-
- ${OUTDIR}:
- @mkdir ${OUTDIR}
-
--${MKMACHDEPINC}: ${MKMACHDEP}
-- ./${MKMACHDEP} > ${MKMACHDEPINC}
-+#${MKMACHDEPINC}: ${MKMACHDEP}
-+# ./${MKMACHDEP} > ${MKMACHDEPINC}
-
- ${MKMACHDEP}: ${MKMACHDEPOBJS}
- ${LD} -o ${MKMACHDEP} ${MKMACHDEPOBJS} ${LDFLAGS}
+++ /dev/null
-diff -ruaN xmail-1.24.orig/Makefile.lnx xmail-1.24/Makefile.lnx
---- xmail-1.24.orig/Makefile.lnx 2006-12-31 20:03:59.000000000 +0100
-+++ xmail-1.24/Makefile.lnx 2007-02-02 13:11:29.000000000 +0100
-@@ -19,9 +19,9 @@
- # Davide Libenzi <davidel@xmailserver.org>
- #
- SYSTYPE = linux
--CC = g++
--LD = g++
--STRIP = strip
-+CC = $(CXX)
-+LD = $(CXX)
-+#STRIP = strip
-
- ifneq ("$(WITH_SSL_INCLUDE)", "")
- CFLAGS := $(CFLAGS) -I$(WITH_SSL_INCLUDE)
+++ /dev/null
-diff -ruaN xmail-1.24.orig/xmail xmail-1.24/xmail
---- xmail-1.24.orig/xmail 2006-12-31 20:03:59.000000000 +0100
-+++ xmail-1.24/xmail 2007-02-02 13:14:39.000000000 +0100
-@@ -19,7 +19,7 @@
- test -f $DAEMON || exit 0
-
- set -e
--ulimit -c 20000
-+ulimit -c 10000
-
- start_xmail()
- {
+++ /dev/null
-diff -ruN xmail-1.24-old/Makefile.common xmail-1.24-new/Makefile.common
---- xmail-1.24-old/Makefile.common 2007-09-01 17:30:57.000000000 +0200
-+++ xmail-1.24-new/Makefile.common 2007-09-01 17:34:00.000000000 +0200
-@@ -24,10 +24,10 @@
- endif
-
- ifeq ($(XMAIL_DEBUG), 1)
-- CFLAGS := $(CFLAGS) -O0 -g
-+ CFLAGS := -O0 -g $(CFLAGS)
- STRIP = touch
- else
-- CFLAGS := $(CFLAGS) -O2
-+ CFLAGS := -O2 $(CFLAGS)
- endif
-
- OUTDIR = bin
+++ /dev/null
-#
-# Copyright (C) 2006 OpenWrt.org
-#
-# This is free software, licensed under the GNU General Public License v2.
-# See /LICENSE for more information.
-#
-# $Id$
-
-include $(TOPDIR)/rules.mk
-
-PKG_NAME:=fetchmail
-PKG_VERSION:=6.2.5
-PKG_RELEASE:=1
-
-PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
-PKG_SOURCE_URL:=http://www.catb.org/~esr/fetchmail/
-PKG_MD5SUM:=9956b30139edaa4f5f77c4d0dbd80225
-
-PKG_BUILD_DIR:=$(BUILD_DIR)/$(PKG_NAME)-$(PKG_VERSION)
-PKG_INSTALL_DIR:=$(PKG_BUILD_DIR)/ipkg-install
-
-include $(INCLUDE_DIR)/package.mk
-
-define Package/fetchmail
- SECTION:=utils
- CATEGORY:=Utilities
- TITLE:=Remote mail retriever
- URL:=http://www.catb.org/~esr/fetchmail/
- SUBMENU:=mail
-endef
-
-define Package/fetchmail/description
- Retrieves remote mail via POP/IMAP.
- Very useful in conjunction with mutt.
-endef
-
-define Build/Configure
- $(call Build/Configure/Default, \
- --enable-fallback=procmail \
- --without-hesiod \
- , \
- ac_cv_path_procmail=/usr/sbin/procmail \
- )
-endef
-
-define Build/Compile
- $(MAKE) -C $(PKG_BUILD_DIR) \
- DESTDIR="$(PKG_INSTALL_DIR)" \
- all install
-endef
-
-define Package/fetchmail/install
- $(INSTALL_DIR) $(1)/usr/bin
- $(INSTALL_BIN) $(PKG_INSTALL_DIR)/usr/bin/fetchmail $(1)/usr/bin/
-endef
-
-$(eval $(call BuildPackage,fetchmail))
+++ /dev/null
-diff -urN fetchmail-6.2.5/config.sub fetchmail-6.2.5.new/config.sub
---- fetchmail-6.2.5/config.sub 2003-07-17 03:03:20.000000000 +0200
-+++ fetchmail-6.2.5.new/config.sub 2006-03-30 00:36:11.000000000 +0200
-@@ -176,7 +176,7 @@
- | 580 | i960 | h8300 \
- | x86 | ppcbe | mipsbe | mipsle | shbe | shle | armbe | armle \
- | hppa | hppa1.0 | hppa1.1 | hppa2.0 | hppa2.0w | hppa2.0n \
-- | hppa64 \
-+ | hppa64 | x86_64 \
- | alpha | alphaev[4-8] | alphaev56 | alphapca5[67] \
- | alphaev6[78] \
- | we32k | ns16k | clipper | i370 | sh | powerpc | powerpcle \
-@@ -194,7 +194,7 @@
- # We use `pc' rather than `unknown'
- # because (1) that's what they normally are, and
- # (2) the word "unknown" tends to confuse beginning users.
-- i[34567]86)
-+ i*86 | x86_64)
- basic_machine=$basic_machine-pc
- ;;
- # Object if more than one company name word.
-@@ -209,7 +209,7 @@
- | mips-* | pyramid-* | tron-* | a29k-* | romp-* | rs6000-* \
- | power-* | none-* | 580-* | cray2-* | h8300-* | h8500-* | i960-* \
- | xmp-* | ymp-* \
-- | x86-* | ppcbe-* | mipsbe-* | mipsle-* | shbe-* | shle-* | armbe-* | armle-* \
-+ | x86-* | x86_64-* | ppcbe-* | mipsbe-* | mipsle-* | shbe-* | shle-* | armbe-* | armle-* \
- | hppa-* | hppa1.0-* | hppa1.1-* | hppa2.0-* | hppa2.0w-* \
- | hppa2.0n-* | hppa64-* \
- | alpha-* | alphaev[4-8]-* | alphaev56-* | alphapca5[67]-* \
-@@ -256,6 +256,12 @@
- basic_machine=a29k-none
- os=-bsd
- ;;
-+ amd64)
-+ basic_machine=x86_64-pc
-+ ;;
-+ amd64-*)
-+ basic_machine=x86_64-`echo $basic_machine | sed 's/^[^-]*-//'`
-+ ;;
- amdahl)
- basic_machine=580-amdahl
- os=-sysv
+++ /dev/null
-diff -ruN fetchmail-6.2.5-old/po/fr.po.rej fetchmail-6.2.5-new/po/fr.po.rej
---- fetchmail-6.2.5-old/po/fr.po.rej 2003-07-17 03:23:26.000000000 +0200
-+++ fetchmail-6.2.5-new/po/fr.po.rej 1970-01-01 01:00:00.000000000 +0100
-@@ -1,17 +0,0 @@
--***************
--*** 2166,2172 ****
-- #: rcfile_y.y:433
-- #, fuzzy, c-format
-- msgid "File %s must be a regular file.\n"
--- msgstr "Le fichier %s doit etre un lien symbolique.\n"
--
-- #: rcfile_y.y:440
-- #, c-format
----- 2166,2172 ----
-- #: rcfile_y.y:433
-- #, fuzzy, c-format
-- msgid "File %s must be a regular file.\n"
--+ msgstr "Le fichier %s doit ĂȘtre un fichier normal.\n"
--
-- #: rcfile_y.y:440
-- #, c-format
+++ /dev/null
-#
-# Copyright (C) 2006 OpenWrt.org
-#
-# This is free software, licensed under the GNU General Public License v2.
-# See /LICENSE for more information.
-#
-# $Id$
-
-include $(TOPDIR)/rules.mk
-
-PKG_NAME:=mutt
-PKG_VERSION:=1.5.16
-PKG_RELEASE:=2
-
-PKG_SOURCE_URL:=@SF/mutt
-PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
-PKG_MD5SUM:=10eff7024dbb7ce1f773d688a69ea9db
-
-PKG_BUILD_DIR:=$(BUILD_DIR)/$(PKG_NAME)-$(PKG_VERSION)
-
-include $(INCLUDE_DIR)/package.mk
-
-define Package/mutt
- SECTION:=utils
- CATEGORY:=Utilities
- DEPENDS:=+libopenssl +libncurses
- TITLE:=Console mail client
- URL:=http://www.mutt.org/
- SUBMENU:=mail
-endef
-
-CONFIGURE_ARGS += \
- --includedir=$(PKG_BUILD_DIR)/. \
- --oldincludedir=$(PKG_BUILD_DIR)/. \
- --enable-pop \
- --enable-imap \
- --with-ssl
-
-define Package/mutt/install
- $(INSTALL_DIR) $(1)/usr/bin
- $(CP) $(PKG_BUILD_DIR)/mutt $(1)/usr/bin/
-endef
-
-$(eval $(call BuildPackage,mutt))
+++ /dev/null
-#
-# Copyright (C) 2006 OpenWrt.org
-#
-# This is free software, licensed under the GNU General Public License v2.
-# See /LICENSE for more information.
-#
-# $Id$
-
-include $(TOPDIR)/rules.mk
-
-PKG_NAME:=procmail
-PKG_VERSION:=3.22
-PKG_RELEASE:=1
-
-PKG_SOURCE_URL:=http://www.procmail.org/
-PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
-PKG_MD5SUM:=1678ea99b973eb77eda4ecf6acae53f1
-
-PKG_BUILD_DIR:=$(BUILD_DIR)/$(PKG_NAME)-$(PKG_VERSION)
-
-include $(INCLUDE_DIR)/package.mk
-
-define Package/procmail
- SECTION:=utils
- CATEGORY:=Utilities
- TITLE:=Mail processing tool
- URL:=http://www.procmail.org
- SUBMENU:=mail
-endef
-
-define Package/procmail/description
- Procmail is able to process and classify incoming mail into
- different mail boxes.
- Very useful in conjunction with mutt.
-endef
-
-define Build/Compile
- $(MAKE) -C $(PKG_BUILD_DIR)/src -f ../Makefile.openwrt \
- $(TARGET_CONFIGURE_OPTS)
-endef
-
-define Package/procmail/install
- $(INSTALL_DIR) $(1)/usr/bin
- $(CP) $(PKG_BUILD_DIR)/src/procmail $(1)/usr/bin/
- $(CP) $(PKG_BUILD_DIR)/src/formail $(1)/usr/bin/
-endef
-
-$(eval $(call BuildPackage,procmail))
+++ /dev/null
-This patch is required to make procmail cross compile - it tries to run some automatic tests which
-obviously do not work in a cross compiled environment.
-
-
-diff -Naur procmail-3.22_orig/autoconf.h procmail-3.22/autoconf.h
---- procmail-3.22_orig/autoconf.h 1970-01-01 10:00:00.000000000 +1000
-+++ procmail-3.22/autoconf.h 2006-03-23 12:15:36.000000000 +1100
-@@ -0,0 +1,21 @@
-+/* This file was automagically generated by autoconf */
-+
-+/* 5 moves in 64 steps of size 16384 when reallocing */
-+#define NOpw_class
-+#define NOstrlcat
-+#define NOsetrgid
-+#define MAX_argc 7588
-+/* Your system's strstr() is 1.12 times FASTER than my C-routine */
-+#define UDP_protocolno 17
-+#define BIFF_serviceport "512"
-+#define IP_localhost {127,0,0,1}
-+#define MAILSPOOLDIR "/var/spool/mail/"
-+#define SENDMAIL "/usr/sbin/sendmail"
-+#define CF_no_procmail_yet
-+#define buggy_SENDMAIL
-+#define defPATH "PATH=$HOME/bin:/bin:/usr/bin:/usr/local/bin:/usr/bin/X11"
-+#define defSPATH "PATH=/bin:/usr/bin:/usr/local/bin:/usr/bin/X11"
-+#define PM_VERSION "3.22"
-+/* Hotwire LOCKINGTEST=100 */
-+/* Procmail will lock via: dotlocking, fcntl() */
-+/* autoconf completed */
-diff -Naur procmail-3.22_orig/Makefile.openwrt procmail-3.22/Makefile.openwrt
---- procmail-3.22_orig/Makefile.openwrt 1970-01-01 10:00:00.000000000 +1000
-+++ procmail-3.22/Makefile.openwrt 2006-03-23 12:15:36.000000000 +1100
-@@ -0,0 +1,18 @@
-+PM_OBJ=cstdio.o common.o exopen.o goodies.o locking.o \
-+ mailfold.o foldinfo.o misc.o pipes.o regexp.o robust.o \
-+ sublib.o acommon.o mcommon.o lastdirsep.o authenticate.o \
-+ lmtp.o memblk.o variables.o from.o comsat.o
-+
-+FM_OBJ=common.o fields.o formisc.o sublib.o ecommon.o \
-+ acommon.o
-+
-+LDFLAGS = -lm -lnsl -ldl -lc
-+CFLAGS = -Os -DPROCMAIL
-+
-+all: procmail formail
-+
-+procmail: procmail.o $(PM_OBJ)
-+ $(CC) $(CFLAGS) $@.o $(PM_OBJ) -o $@ $(LDFLAGS)
-+
-+formail: formail.o $(FM_OBJ)
-+ $(CC) $(CFLAGS) $@.o $(FM_OBJ) -o $@ $(LDFLAGS)