If the value of &%av_scanner%& starts with a dollar character, it is expanded
before use.
The usual list-parsing of the content (see &<<SECTlistconstruct>>&) applies.
-The following scanner types are supported in this release:
+The following scanner types are supported in this release,
+.new
+though individual ones can be included or not at build time:
+.wen
.vlist
.vitem &%avast%&
void
features_malware(void)
{
-struct scan * sc;
-uschar * s, * t;
+const struct scan * sc;
+const uschar * s;
+uschar * t;
uschar buf[64];
spf(buf, sizeof(buf), US"_HAVE_MALWARE_");
binaries: $(BINARIES)
sysbinaries: FRC
- bin/locate.sh initdb postgres
+ bin/locate.sh initdb postgres pg_ctl
# Compile and link the programs:
#
#!/bin/sh
-[ -e bin.sys ] || mkdir bin.sys
+[ -d bin.sys ] || mkdir bin.sys
cd bin.sys
while read d
ln -s $d/$1 .
shift
done
+ exit 0
fi
done <<-HERE
/bin
# Exim test configuration 4600
-SERVER=
-
.include DIR/aux-var/std_conf_prefix
primary_hostname = myhost.test.ex
acl_smtp_rcpt = check_rcpt
-queue_only
-queue_run_in_order
-
-
begin acl
check_rcpt: