https://bz.apache.org/SpamAssassin/show_bug.cgi?id=8255
Bug ID: 8255
Summary: sa-update calls GET
/MIRRORED.BY%20https://spamassassin.apache.org/updates
/MIRRORED.BY HTTP/1.1
Product: Spamassassin
Version: 4.0.0
Hardware: PC
OS: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sa-update
Assignee: [email protected]
Reporter: [email protected]
Target Milestone: Undefined
Attached is the output of strace -s2048 -f sa-update -D --httputil wget . It is
executed on Debian Bookworm (actually docker.io/library/debian:bookworm) image.
This is version 4.0.0 (not 4.0.1) with perl 5.36.0. In Debian terms this is
actually version 4.0.0-6.
The strace output contains (with many skipped lines):
socket(AF_INET, SOCK_DGRAM|SOCK_CLOEXEC, IPPROTO_UDP) = 3
sendto(3,
"\16F\1\0\0\1\0\0\0\0\0\0\7mirrors\7updates\fspamassassin\3org\0\0\20\0\1", 50,
0, {sa_family=AF_INET, sin_port=htons(53), sin
_addr=inet_addr("192.168.127.1")}, 16) = 50
recvfrom(3,
"\16F\201\200\0\1\0\1\0\0\0\0\7mirrors\7updates\fspamassassin\3org\0\0\20\0\1\7mirrors\7updates\fspamassassin\3org\0\0\20\0\1\0\0\0\0\0b-http://sa-update.spamassassin.org/MIRRORED.BY3https://spamassassin.apache.org/updates/MIRRORED.BY",
512, 0, {sa_family=AF_I
[pid 32379] execve("/usr/bin/wget", ["/usr/bin/wget", "-q", "--max-redirect=2",
"--tries=3", "--dns-timeout=20", "--connect-timeout=30", "--read-timeout=300",
"-O", "MIRRORED.BY", "-U", "sa-update/4.0.0 / svn1900642/4.0.0", "--",
"http://sa-update.spamassassin.org/MIRRORED.BY
https://spamassassin.apache.org/updates/MIRRORED.BY"], 0x55be2543f8a0 /* 16
vars */) = 0
[pid 32379] write(4, "GET
/MIRRORED.BY%20https://spamassassin.apache.org/updates/MIRRORED.BY
HTTP/1.1\r\nHost: sa-update.spamassassin.org\r\nUser-Agent: sa-update/4.0.0 /
svn1900642/4.0.0\r\nAccept: */*\r\nAccept-Encoding: identity\r\nConnection:
Keep-Alive\r\n\r\n", 229) = 229
So obviously GET
/MIRRORED.BY%20https://spamassassin.apache.org/updates/MIRRORED.BY is not going
to work and there is something wrong.
--
You are receiving this mail because:
You are the assignee for the bug.