1 |
# $Id: qpsmtpd.spec,v 1.19 2016/05/16 09:54:16 vip-ire Exp $ |
# $Id: qpsmtpd.spec,v 1.29 2021/11/15 17:04:33 jpp Exp $ |
2 |
|
|
3 |
Name: qpsmtpd |
Name: qpsmtpd |
4 |
Version: 0.96 |
Version: 0.96 |
5 |
Release: 13%{?dist} |
Release: 21%{?dist} |
6 |
Summary: qpsmtpd + qpsmtpd-apache |
Summary: qpsmtpd + qpsmtpd-apache |
7 |
License: MIT |
License: MIT |
8 |
Group: System Environment/Daemons |
Group: System Environment/Daemons |
13 |
BuildArch: noarch |
BuildArch: noarch |
14 |
Requires: perl(Mail::Header), perl(Net::DNS) perl(Net::IP) |
Requires: perl(Mail::Header), perl(Net::DNS) perl(Net::IP) |
15 |
Requires: perl(IO::Socket::SSL) >= 1.70 |
Requires: perl(IO::Socket::SSL) >= 1.70 |
16 |
|
Requires: perl(Data::Validate::Domain) |
17 |
Requires(pre): coreutils, shadow-utils, perl |
Requires(pre): coreutils, shadow-utils, perl |
18 |
|
|
19 |
Source0: %{name}-%{version}.tar.gz |
Source0: %{name}-%{version}.tar.gz |
44 |
Patch18: qpsmtpd-0.96-check_negative_karma_strikes.patch |
Patch18: qpsmtpd-0.96-check_negative_karma_strikes.patch |
45 |
Patch19: qpsmtpd-0.96-addr_defined_before_use.patch |
Patch19: qpsmtpd-0.96-addr_defined_before_use.patch |
46 |
Patch20: qpsmtpd-0.96-check_rua_is_defined.patch |
Patch20: qpsmtpd-0.96-check_rua_is_defined.patch |
47 |
|
Patch21: qpsmtpd-0.96-remove_karma_rcpt_handler.patch |
48 |
|
Patch22: qpsmtpd-0.96-eval_dkim_policies.patch |
49 |
|
Patch23: qpsmtpd-0.96-uribl_validate_domains.patch |
50 |
|
Patch24: qpsmtpd-0.96-bz10112-whitelist.patch |
51 |
|
Patch25: qpsmtpd-0.96-SME10139-Message-Id.patch |
52 |
|
Patch26: qpsmtpd-0.96-bz10290-spamassassin-fetchmail.patch |
53 |
|
Patch27: qpsmtpd-0.96-bz10387-load_plugins-on-start.patch |
54 |
|
|
55 |
%description |
%description |
56 |
qpsmtpd is a flexible smtpd daemon written in Perl. Apart from the core |
qpsmtpd is a flexible smtpd daemon written in Perl. Apart from the core |
93 |
%patch18 -p1 |
%patch18 -p1 |
94 |
%patch19 -p1 |
%patch19 -p1 |
95 |
%patch20 -p1 |
%patch20 -p1 |
96 |
|
%patch21 -p1 |
97 |
|
%patch22 -p1 |
98 |
|
%patch23 -p1 |
99 |
|
%patch24 -p1 |
100 |
|
%patch25 -p1 |
101 |
|
%patch26 -p1 |
102 |
|
%patch27 -p1 |
103 |
|
|
104 |
%build |
%build |
105 |
CFLAGS="$RPM_OPT_FLAGS" perl Makefile.PL INSTALLDIRS="vendor" PREFIX="%{buildroot}%{_prefix}" |
CFLAGS="$RPM_OPT_FLAGS" perl Makefile.PL INSTALLDIRS="vendor" PREFIX="%{buildroot}%{_prefix}" |
172 |
|
|
173 |
|
|
174 |
%changelog |
%changelog |
175 |
|
* Tue Nov 16 2021 Jean-Philippe Pialasse <tests@pialasse.com> 0.96-21.sme |
176 |
|
- fix fetchmail patch to check local_ip [SME: 11763] |
177 |
|
|
178 |
|
* Mon Nov 15 2021 Jean-Philippe Pialasse <tests@pialasse.com> 0.96-20.sme |
179 |
|
- fix configuration not honoured on initial start [SME: 10387] |
180 |
|
commented out load_plugins see https://github.com/smtpd/qpsmtpd/issues/288. |
181 |
|
|
182 |
|
* Sun Mar 11 2018 Jean-Philippe Pialasse <tests@pialasse.com> 0.96-19.sme |
183 |
|
- add support to force spamcheck on specific IP for fetchmail [SME: 10290] |
184 |
|
|
185 |
|
* Tue Mar 07 2017 Jean-Philippe Pialasse <tests@pialasse.com> 0.96-18.sme |
186 |
|
- Removed Message-Id validation, as it rejects MS account validation email [SME: 10139] |
187 |
|
|
188 |
|
* Mon Feb 27 2017 Jean-Philippe Pialasse <tests@pialasse.com> 0.96-17.sme |
189 |
|
- fix whitelist plugin to support helo with naughty rejecting at mail stage [SME: 10112] |
190 |
|
|
191 |
|
* Mon Jul 11 2016 Daniel Berteaud <daniel@firewall-services.com> 0.96-16.sme |
192 |
|
- Validate domains found in uribl with Data::Validate::Domain [SME: 9467] |
193 |
|
|
194 |
|
* Tue Jul 5 2016 Daniel Berteaud <daniel@firewall-services.com> 0.96-15.sme |
195 |
|
- Use eval to fetch dkim policies, prevent fatal errors in case of DNS |
196 |
|
timeout [SME: 9480] |
197 |
|
|
198 |
|
* Wed Jun 15 2016 Daniel Berteaud <daniel@firewall-services.com> 0.96-14.sme |
199 |
|
- Remove karma rcpt handling (buggy and doesn't make a lot of sense) |
200 |
|
[SME: 9462] |
201 |
|
|
202 |
* Sat May 28 2016 Daniel Berteaud <daniel@firewall-services.com> 0.96-13.sme |
* Sat May 28 2016 Daniel Berteaud <daniel@firewall-services.com> 0.96-13.sme |
203 |
- Check rua is defined before trying to parse it to prevent an error |
- Check rua is defined before trying to parse it to prevent an error |
204 |
if a domain has a DMARC entry published with no rua [SME: 9206] |
if a domain has a DMARC entry published with no rua [SME: 9206] |