1 |
# $Id: qpsmtpd.spec,v 1.18 2016/05/09 21:59:36 vip-ire Exp $ |
# $Id: qpsmtpd.spec,v 1.27 2017/03/08 17:13:43 unnilennium Exp $ |
2 |
|
|
3 |
Name: qpsmtpd |
Name: qpsmtpd |
4 |
Version: 0.96 |
Version: 0.96 |
5 |
Release: 12%{?dist} |
Release: 19%{?dist} |
6 |
Summary: qpsmtpd + qpsmtpd-apache |
Summary: qpsmtpd + qpsmtpd-apache |
7 |
License: MIT |
License: MIT |
8 |
Group: System Environment/Daemons |
Group: System Environment/Daemons |
13 |
BuildArch: noarch |
BuildArch: noarch |
14 |
Requires: perl(Mail::Header), perl(Net::DNS) perl(Net::IP) |
Requires: perl(Mail::Header), perl(Net::DNS) perl(Net::IP) |
15 |
Requires: perl(IO::Socket::SSL) >= 1.70 |
Requires: perl(IO::Socket::SSL) >= 1.70 |
16 |
|
Requires: perl(Data::Validate::Domain) |
17 |
Requires(pre): coreutils, shadow-utils, perl |
Requires(pre): coreutils, shadow-utils, perl |
18 |
|
|
19 |
Source0: %{name}-%{version}.tar.gz |
Source0: %{name}-%{version}.tar.gz |
43 |
Patch17: qpsmtpd-0.96-spf_on_no_dmarc_policy.patch |
Patch17: qpsmtpd-0.96-spf_on_no_dmarc_policy.patch |
44 |
Patch18: qpsmtpd-0.96-check_negative_karma_strikes.patch |
Patch18: qpsmtpd-0.96-check_negative_karma_strikes.patch |
45 |
Patch19: qpsmtpd-0.96-addr_defined_before_use.patch |
Patch19: qpsmtpd-0.96-addr_defined_before_use.patch |
46 |
|
Patch20: qpsmtpd-0.96-check_rua_is_defined.patch |
47 |
|
Patch21: qpsmtpd-0.96-remove_karma_rcpt_handler.patch |
48 |
|
Patch22: qpsmtpd-0.96-eval_dkim_policies.patch |
49 |
|
Patch23: qpsmtpd-0.96-uribl_validate_domains.patch |
50 |
|
Patch24: qpsmtpd-0.96-bz10112-whitelist.patch |
51 |
|
Patch25: qpsmtpd-0.96-SME10139-Message-Id.patch |
52 |
|
Patch26: qpsmtpd-0.96-bz10290-spamassassin-fetchmail.patch |
53 |
|
|
54 |
%description |
%description |
55 |
qpsmtpd is a flexible smtpd daemon written in Perl. Apart from the core |
qpsmtpd is a flexible smtpd daemon written in Perl. Apart from the core |
91 |
%patch17 -p1 |
%patch17 -p1 |
92 |
%patch18 -p1 |
%patch18 -p1 |
93 |
%patch19 -p1 |
%patch19 -p1 |
94 |
|
%patch20 -p1 |
95 |
|
%patch21 -p1 |
96 |
|
%patch22 -p1 |
97 |
|
%patch23 -p1 |
98 |
|
%patch24 -p1 |
99 |
|
%patch25 -p1 |
100 |
|
%patch26 -p1 |
101 |
|
|
102 |
%build |
%build |
103 |
CFLAGS="$RPM_OPT_FLAGS" perl Makefile.PL INSTALLDIRS="vendor" PREFIX="%{buildroot}%{_prefix}" |
CFLAGS="$RPM_OPT_FLAGS" perl Makefile.PL INSTALLDIRS="vendor" PREFIX="%{buildroot}%{_prefix}" |
170 |
|
|
171 |
|
|
172 |
%changelog |
%changelog |
173 |
|
* Sun Mar 11 2018 Jean-Philipe Pialasse <tests@pialasse.com> 0.96-19.sme |
174 |
|
- add support to force spamcheck on specific IP for fetchmail [SME: 10290] |
175 |
|
|
176 |
|
* Tue Mar 07 2017 Jean-Philipe Pialasse <tests@pialasse.com> 0.96-18.sme |
177 |
|
- Removed Message-Id validation, as it rejects MS account validation email [SME: 10139] |
178 |
|
|
179 |
|
* Mon Feb 27 2017 Jean-Philipe Pialasse <tests@pialasse.com> 0.96-17.sme |
180 |
|
- fix whitelist plugin to support helo with naughty rejecting at mail stage [SME: 10112] |
181 |
|
|
182 |
|
* Mon Jul 11 2016 Daniel Berteaud <daniel@firewall-services.com> 0.96-16.sme |
183 |
|
- Validate domains found in uribl with Data::Validate::Domain [SME: 9467] |
184 |
|
|
185 |
|
* Tue Jul 5 2016 Daniel Berteaud <daniel@firewall-services.com> 0.96-15.sme |
186 |
|
- Use eval to fetch dkim policies, prevent fatal errors in case of DNS |
187 |
|
timeout [SME: 9480] |
188 |
|
|
189 |
|
* Wed Jun 15 2016 Daniel Berteaud <daniel@firewall-services.com> 0.96-14.sme |
190 |
|
- Remove karma rcpt handling (buggy and doesn't make a lot of sense) |
191 |
|
[SME: 9462] |
192 |
|
|
193 |
|
* Sat May 28 2016 Daniel Berteaud <daniel@firewall-services.com> 0.96-13.sme |
194 |
|
- Check rua is defined before trying to parse it to prevent an error |
195 |
|
if a domain has a DMARC entry published with no rua [SME: 9206] |
196 |
|
|
197 |
* Mon May 16 2016 Daniel Berteaud <daniel@firewall-services.com> 0.96-12.sme |
* Mon May 16 2016 Daniel Berteaud <daniel@firewall-services.com> 0.96-12.sme |
198 |
- Fix error when RCPT TO is not valid [SME: 9460] |
- Fix error when RCPT TO is not valid [SME: 9460] |
199 |
|
|