https://issues.apache.org/SpamAssassin/show_bug.cgi?id=5880





--- Comment #2 from Justin Mason <[EMAIL PROTECTED]>  2008-04-17 01:47:58 PST 
---
it might be worth taking it upstream to Net::DNS -- e.g. a parameter we can set
in the Net::DNS namespace, $Net::DNS::SUPPORT_DNSSEC = 0.

they already lazy-load and conditionally evaluate code based on the presence of
Net::DNS::SEC module -- adding a boolean check to that would be relatively
easy.

BEGIN {

    $DNSSEC = eval {
            local $SIG{'__DIE__'} = 'DEFAULT';
            require Net::DNS::SEC;
            1
            } ? 1 : 0;


}


(note that since it's a BEGIN block we can't use the nicer "parameter to
constructor" idiom without some heavier code changes there though.)

in my experience the Net::DNS maintainers have been quite good about
responsiveness to patches....


-- 
Configure bugmail: 
https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

Reply via email to