1 |
# $Id: qpsmtpd.spec,v 1.31 2012/05/04 15:44:20 charliebrady Exp $ |
# $Id: qpsmtpd.spec,v 1.32 2013/04/23 05:30:06 burnat Exp $ |
2 |
|
|
3 |
Name: qpsmtpd |
Name: qpsmtpd |
4 |
Version: 0.84 |
Version: 0.84 |
5 |
Release: 4%{?dist} |
Release: 5%{?dist} |
6 |
Summary: qpsmtpd + qpsmtpd-apache + qpsmtpd-async |
Summary: qpsmtpd + qpsmtpd-apache + qpsmtpd-async |
7 |
License: MIT |
License: MIT |
8 |
Group: System Environment/Daemons |
Group: System Environment/Daemons |
61 |
Patch37: 0037-Revert-Spool-body-when-transaction-body_fh-is-called.patch |
Patch37: 0037-Revert-Spool-body-when-transaction-body_fh-is-called.patch |
62 |
Patch38: 0038-Patch-FATAL-PLUGIN-ERROR-check_basicheaders.patch |
Patch38: 0038-Patch-FATAL-PLUGIN-ERROR-check_basicheaders.patch |
63 |
Patch39: 0039-qpsmtpd-0.84-spamassassin_size_limit.patch |
Patch39: 0039-qpsmtpd-0.84-spamassassin_size_limit.patch |
64 |
|
Patch40: 0040-qpsmtpd-forkserver_fix_Net_DNS_update_breaks_qpsmtpd.patch |
65 |
|
|
66 |
Patch100: qpsmtpd-0.40-badrcptto_allowrelay.patch |
Patch100: qpsmtpd-0.40-badrcptto_allowrelay.patch |
67 |
Patch101: qpsmtpd-0.83-peer_hooks.patch |
Patch101: qpsmtpd-0.83-peer_hooks.patch |
136 |
%patch37 -p1 |
%patch37 -p1 |
137 |
%patch38 -p1 |
%patch38 -p1 |
138 |
%patch39 -p1 |
%patch39 -p1 |
139 |
|
%patch40 -p1 |
140 |
|
|
141 |
%patch100 -p1 |
%patch100 -p1 |
142 |
%patch101 -p1 |
%patch101 -p1 |
236 |
%pre |
%pre |
237 |
|
|
238 |
%changelog |
%changelog |
239 |
|
* Thu Apr 25 2013 chris burnat <devlist@burnat.com> 0.84.5.sme |
240 |
|
- Fix Net::DNS update breaks qpsmtpd, codes suggested by Ian [SME: 7557] |
241 |
|
|
242 |
* Tue Apr 23 2013 chris burnat <devlist@burnat.com> 0.84-4.sme |
* Tue Apr 23 2013 chris burnat <devlist@burnat.com> 0.84-4.sme |
243 |
- qpsmtpd allows the spamassassin plugin to read the size limit |
- qpsmtpd allows the spamassassin plugin to read the size limit |
244 |
from its arguments, patch by Daniel [SME: 7541] |
from its arguments, patch by Daniel [SME: 7541] |