1 |
# $Id: qpsmtpd.spec,v 1.1 2013/02/02 00:59:45 slords Exp $ |
# $Id: qpsmtpd.spec,v 1.14 2015/05/19 20:47:47 vip-ire Exp $ |
2 |
|
|
3 |
Name: qpsmtpd |
Name: qpsmtpd |
4 |
Version: 0.84 |
Version: 0.84 |
5 |
Release: 5%{?dist} |
Release: 14%{?dist} |
6 |
Summary: qpsmtpd + qpsmtpd-apache + qpsmtpd-async |
Summary: qpsmtpd + qpsmtpd-apache + qpsmtpd-async |
7 |
License: MIT |
License: MIT |
8 |
Group: System Environment/Daemons |
Group: System Environment/Daemons |
12 |
BuildRequires: perl(ExtUtils::MakeMaker) |
BuildRequires: perl(ExtUtils::MakeMaker) |
13 |
BuildArch: noarch |
BuildArch: noarch |
14 |
Requires: perl(Mail::Header), perl(Net::DNS) perl(Net::IP) |
Requires: perl(Mail::Header), perl(Net::DNS) perl(Net::IP) |
15 |
|
Requires: perl(IO::Socket::SSL) >= 1.70 |
16 |
Requires(pre): coreutils, shadow-utils, perl |
Requires(pre): coreutils, shadow-utils, perl |
17 |
|
|
18 |
Source0: %{name}-%{version}.tar.gz |
Source0: %{name}-%{version}.tar.gz |
63 |
Patch37: 0037-Revert-Spool-body-when-transaction-body_fh-is-called.patch |
Patch37: 0037-Revert-Spool-body-when-transaction-body_fh-is-called.patch |
64 |
Patch38: 0038-Patch-FATAL-PLUGIN-ERROR-check_basicheaders.patch |
Patch38: 0038-Patch-FATAL-PLUGIN-ERROR-check_basicheaders.patch |
65 |
Patch39: 0039-qpsmtpd-0.84-spamassassin_size_limit.patch |
Patch39: 0039-qpsmtpd-0.84-spamassassin_size_limit.patch |
66 |
|
Patch40: 0040-qpsmtpd-forkserver_fix_Net_DNS_update_breaks_qpsmtpd.patch |
67 |
|
|
68 |
Patch100: qpsmtpd-0.40-badrcptto_allowrelay.patch |
Patch100: qpsmtpd-0.40-badrcptto_allowrelay.patch |
69 |
Patch101: qpsmtpd-0.83-peer_hooks.patch |
Patch101: qpsmtpd-0.83-peer_hooks.patch |
70 |
Patch102: qpsmtpd-0.83-loginit.patch |
Patch102: qpsmtpd-0.83-loginit.patch |
71 |
Patch103: qpsmtpd-forkserver-keepalive.patch |
Patch103: qpsmtpd-forkserver-keepalive.patch |
72 |
|
Patch104: qpsmtpd-0.84-accept-empty-email.patch |
73 |
|
Patch105: qpsmtpd-0.84-fix_eq_operator.patch |
74 |
|
Patch106: qpsmtpd-0.84-remove_denysoft_on_spf_softfail.patch |
75 |
|
Patch107: qpsmtpd-0.84-notls_conf.patch |
76 |
|
Patch108: qpsmtpd-0.84-disable_sslv3.patch |
77 |
|
|
78 |
%description |
%description |
79 |
qpsmtpd is a flexible smtpd daemon written in Perl. Apart from the core |
qpsmtpd is a flexible smtpd daemon written in Perl. Apart from the core |
143 |
%patch37 -p1 |
%patch37 -p1 |
144 |
%patch38 -p1 |
%patch38 -p1 |
145 |
%patch39 -p1 |
%patch39 -p1 |
146 |
|
%patch40 -p1 |
147 |
|
|
148 |
%patch100 -p1 |
%patch100 -p1 |
149 |
%patch101 -p1 |
%patch101 -p1 |
150 |
%patch102 -p1 |
%patch102 -p1 |
151 |
%patch103 -p0 |
%patch103 -p0 |
152 |
|
%patch104 -p1 |
153 |
|
%patch105 -p1 |
154 |
|
%patch106 -p1 |
155 |
|
%patch107 -p1 |
156 |
|
%patch108 -p1 |
157 |
|
|
158 |
%build |
%build |
159 |
CFLAGS="$RPM_OPT_FLAGS" perl Makefile.PL INSTALLDIRS="vendor" PREFIX="%{buildroot}%{_prefix}" |
CFLAGS="$RPM_OPT_FLAGS" perl Makefile.PL INSTALLDIRS="vendor" PREFIX="%{buildroot}%{_prefix}" |
238 |
%pre |
%pre |
239 |
|
|
240 |
%changelog |
%changelog |
241 |
|
* Tue May 19 2015 Daniel Berteaud <daniel@firewall-services.com> 0.84-14.sme |
242 |
|
- Disable SSLv3 [SME: 8926] |
243 |
|
|
244 |
|
* Fri May 15 2015 Daniel Berteaud <daniel@firewall-services.com> 0.84-13.sme |
245 |
|
- New notls conf to set hosts you dont want to advertize STARTTLS to [SME: 8863] |
246 |
|
|
247 |
|
* Sun Feb 15 2015 Daniel Berteaud <daniel@firewall-services.com> 0.84-12.sme |
248 |
|
- Revert forcing TLSv1 patch as it breaks some inbound delivery [SME: 8851] |
249 |
|
- Revert whitelist_soft dnsbl as it hasn't been verified yet and we need to |
250 |
|
push the fix for TLSv1 [SME: 8747] |
251 |
|
|
252 |
|
* Fri Dec 26 2014 stephane de Labrusse <stephdl@de-labrusse.fr> 0.84-11.sme |
253 |
|
- Modify whitelist_soft transaction to interact with dnsbl filter [SME: 8747] |
254 |
|
- by John Crisp <jcrisp@safeandsoundit.co.uk> |
255 |
|
|
256 |
|
* Mon Dec 22 2014 Daniel Berteaud <daniel@firewall-services.com> 0.84-10.sme |
257 |
|
- Force usage of TLSv1 [SME: 8726] |
258 |
|
|
259 |
|
* Thu Mar 13 2014 Daniel Berteaud <daniel@firewall-services.com> 0.84-9.sme |
260 |
|
- Remove DENYSOFT on SPF softfail [SME: 8273] |
261 |
|
|
262 |
|
* Mon Dec 9 2013 Daniel Berteaud <daniel@firewall-services.com> 0.84-8.sme |
263 |
|
- Fix handling of messages with no body and no trailing \n after headers (eq was |
264 |
|
used in attempted assignment). [SME: 8051, see SME: 7754] |
265 |
|
|
266 |
|
* Fri Jul 5 2013 Ian Wells <esmith@wellsi.com> 0.84-7.sme |
267 |
|
- Accept messages with no body and no trailing \n after headers [SME: 7754] |
268 |
|
|
269 |
|
* Thu Apr 25 2013 chris burnat <devlist@burnat.com> 0.84-6.sme |
270 |
|
- Fix Net::DNS update breaks qpsmtpd, codes suggested by Ian [SME: 7561] |
271 |
|
|
272 |
* Wed Apr 24 2013 Daniel Berteaud <daniel@firewall-services.com> 0.84-5.sme |
* Wed Apr 24 2013 Daniel Berteaud <daniel@firewall-services.com> 0.84-5.sme |
273 |
- allows the spamassassin plugin to read the size limit from its |
- allows the spamassassin plugin to read the size limit from its |
274 |
arguments [SME: 7559] |
arguments [SME: 7559] |
289 |
* Wed Apr 14 2010 <slords@mail.com> 0.84-0.1.sme |
* Wed Apr 14 2010 <slords@mail.com> 0.84-0.1.sme |
290 |
- Update to 0.84 |
- Update to 0.84 |
291 |
- add sme specific patches |
- add sme specific patches |
292 |
|
- Perl module rpms moved to /usr/share/perl5/vendor_perl [SME: 7223] |
293 |
|
|
294 |
* Wed Mar 3 2010 <filippo.carletti@gmail.com> 0.83-0.7.sme |
* Wed Mar 3 2010 <filippo.carletti@gmail.com> 0.83-0.7.sme |
295 |
- Remove spool and log dir from package (in smeserver-qpsmtpd) |
- Remove spool and log dir from package (in smeserver-qpsmtpd) |