1 |
# $Id: qpsmtpd.spec,v 1.31 2012/05/04 15:44:20 charliebrady Exp $ |
# $Id: qpsmtpd.spec,v 1.38 2013/12/09 19:50:01 vip-ire Exp $ |
2 |
|
|
3 |
Name: qpsmtpd |
Name: qpsmtpd |
4 |
Version: 0.84 |
Version: 0.84 |
5 |
Release: 4%{?dist} |
Release: 8%{?dist} |
6 |
Summary: qpsmtpd + qpsmtpd-apache + qpsmtpd-async |
Summary: qpsmtpd + qpsmtpd-apache + qpsmtpd-async |
7 |
License: MIT |
License: MIT |
8 |
Group: System Environment/Daemons |
Group: System Environment/Daemons |
61 |
Patch37: 0037-Revert-Spool-body-when-transaction-body_fh-is-called.patch |
Patch37: 0037-Revert-Spool-body-when-transaction-body_fh-is-called.patch |
62 |
Patch38: 0038-Patch-FATAL-PLUGIN-ERROR-check_basicheaders.patch |
Patch38: 0038-Patch-FATAL-PLUGIN-ERROR-check_basicheaders.patch |
63 |
Patch39: 0039-qpsmtpd-0.84-spamassassin_size_limit.patch |
Patch39: 0039-qpsmtpd-0.84-spamassassin_size_limit.patch |
64 |
|
Patch40: 0040-qpsmtpd-forkserver_fix_Net_DNS_update_breaks_qpsmtpd.patch |
65 |
|
|
66 |
Patch100: qpsmtpd-0.40-badrcptto_allowrelay.patch |
Patch100: qpsmtpd-0.40-badrcptto_allowrelay.patch |
67 |
Patch101: qpsmtpd-0.83-peer_hooks.patch |
Patch101: qpsmtpd-0.83-peer_hooks.patch |
68 |
Patch102: qpsmtpd-0.83-loginit.patch |
Patch102: qpsmtpd-0.83-loginit.patch |
69 |
Patch103: qpsmtpd-forkserver-keepalive.patch |
Patch103: qpsmtpd-forkserver-keepalive.patch |
70 |
|
Patch104: qpsmtpd-0.84-accept-empty-email.patch |
71 |
|
Patch105: qpsmtpd-0.84-fix_eq_operator.patch |
72 |
|
Patch106: qpsmtpd-0.84-remove_denysoft_on_spf_softfail.patch |
73 |
|
|
74 |
%description |
%description |
75 |
qpsmtpd is a flexible smtpd daemon written in Perl. Apart from the core |
qpsmtpd is a flexible smtpd daemon written in Perl. Apart from the core |
139 |
%patch37 -p1 |
%patch37 -p1 |
140 |
%patch38 -p1 |
%patch38 -p1 |
141 |
%patch39 -p1 |
%patch39 -p1 |
142 |
|
%patch40 -p1 |
143 |
|
|
144 |
%patch100 -p1 |
%patch100 -p1 |
145 |
%patch101 -p1 |
%patch101 -p1 |
146 |
%patch102 -p1 |
%patch102 -p1 |
147 |
%patch103 -p0 |
%patch103 -p0 |
148 |
|
%patch104 -p1 |
149 |
|
%patch105 -p1 |
150 |
|
%patch106 -p1 |
151 |
|
|
152 |
%build |
%build |
153 |
CFLAGS="$RPM_OPT_FLAGS" perl Makefile.PL INSTALLSITELIB=%{_prefix}/lib/perl5/site_perl |
CFLAGS="$RPM_OPT_FLAGS" perl Makefile.PL INSTALLSITELIB=%{_prefix}/lib/perl5/site_perl |
242 |
%pre |
%pre |
243 |
|
|
244 |
%changelog |
%changelog |
245 |
|
* Thu Mar 13 2014 Daniel Berteaud <daniel@firewall-services.com> 0.84-8.sme |
246 |
|
- Remove DENYSOFT on SPF softfail [SME: 8272] |
247 |
|
|
248 |
|
* Mon Dec 9 2013 Daniel Berteaud <daniel@firewall-services.com> 0.84-7.sme |
249 |
|
- Fix handling of messages with no body and no trailing \n after headers (eq |
250 |
|
was used in attempted assignment). [SME: 8052, see SME: 6870] |
251 |
|
|
252 |
|
* Sat Jun 29 2013 Ian Wells <esmith@wellsi.com> 0.84-6.sme |
253 |
|
- Accept messages with no body and no trailing \n after headers [SME: 6870] |
254 |
|
|
255 |
|
* Thu Apr 25 2013 chris burnat <devlist@burnat.com> 0.84-5.sme |
256 |
|
- Fix Net::DNS update breaks qpsmtpd, codes suggested by Ian [SME: 7194] |
257 |
|
|
258 |
* Tue Apr 23 2013 chris burnat <devlist@burnat.com> 0.84-4.sme |
* Tue Apr 23 2013 chris burnat <devlist@burnat.com> 0.84-4.sme |
259 |
- qpsmtpd allows the spamassassin plugin to read the size limit |
- qpsmtpd allows the spamassassin plugin to read the size limit |
260 |
from its arguments, patch by Daniel [SME: 7541] |
from its arguments, patch by Daniel [SME: 7541] |