https://issues.apache.org/SpamAssassin/show_bug.cgi?id=5880
--- Comment #2 from Justin Mason <[EMAIL PROTECTED]> 2008-04-17 01:47:58 PST
---
it might be worth taking it upstream to Net::DNS -- e.g. a parameter we can set
in the Net::DNS namespace, $Net::DNS::SUPPORT_DNSSEC = 0.
they already lazy-load and conditionally evaluate code based on the presence of
Net::DNS::SEC module -- adding a boolean check to that would be relatively
easy.
BEGIN {
$DNSSEC = eval {
local $SIG{'__DIE__'} = 'DEFAULT';
require Net::DNS::SEC;
1
} ? 1 : 0;
}
(note that since it's a BEGIN block we can't use the nicer "parameter to
constructor" idiom without some heavier code changes there though.)
in my experience the Net::DNS maintainers have been quite good about
responsiveness to patches....
--
Configure bugmail:
https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.