1 |
# $Id: qpsmtpd.spec,v 1.1 2013/02/02 00:59:45 slords Exp $ |
# $Id: qpsmtpd.spec,v 1.20 2016/01/06 16:16:41 vip-ire Exp $ |
2 |
|
|
3 |
Name: qpsmtpd |
Name: qpsmtpd |
4 |
Version: 0.84 |
Version: 0.84 |
5 |
Release: 5%{?dist} |
Release: 18%{?dist} |
6 |
Summary: qpsmtpd + qpsmtpd-apache + qpsmtpd-async |
Summary: qpsmtpd + qpsmtpd-apache + qpsmtpd-async |
7 |
License: MIT |
License: MIT |
8 |
Group: System Environment/Daemons |
Group: System Environment/Daemons |
12 |
BuildRequires: perl(ExtUtils::MakeMaker) |
BuildRequires: perl(ExtUtils::MakeMaker) |
13 |
BuildArch: noarch |
BuildArch: noarch |
14 |
Requires: perl(Mail::Header), perl(Net::DNS) perl(Net::IP) |
Requires: perl(Mail::Header), perl(Net::DNS) perl(Net::IP) |
15 |
|
Requires: perl(IO::Socket::SSL) >= 1.70 |
16 |
Requires(pre): coreutils, shadow-utils, perl |
Requires(pre): coreutils, shadow-utils, perl |
17 |
|
|
18 |
Source0: %{name}-%{version}.tar.gz |
Source0: %{name}-%{version}.tar.gz |
63 |
Patch37: 0037-Revert-Spool-body-when-transaction-body_fh-is-called.patch |
Patch37: 0037-Revert-Spool-body-when-transaction-body_fh-is-called.patch |
64 |
Patch38: 0038-Patch-FATAL-PLUGIN-ERROR-check_basicheaders.patch |
Patch38: 0038-Patch-FATAL-PLUGIN-ERROR-check_basicheaders.patch |
65 |
Patch39: 0039-qpsmtpd-0.84-spamassassin_size_limit.patch |
Patch39: 0039-qpsmtpd-0.84-spamassassin_size_limit.patch |
66 |
|
Patch40: 0040-qpsmtpd-forkserver_fix_Net_DNS_update_breaks_qpsmtpd.patch |
67 |
|
|
68 |
Patch100: qpsmtpd-0.40-badrcptto_allowrelay.patch |
Patch100: qpsmtpd-0.40-badrcptto_allowrelay.patch |
69 |
Patch101: qpsmtpd-0.83-peer_hooks.patch |
Patch101: qpsmtpd-0.83-peer_hooks.patch |
70 |
Patch102: qpsmtpd-0.83-loginit.patch |
Patch102: qpsmtpd-0.83-loginit.patch |
71 |
Patch103: qpsmtpd-forkserver-keepalive.patch |
Patch103: qpsmtpd-forkserver-keepalive.patch |
72 |
|
Patch104: qpsmtpd-0.84-accept-empty-email.patch |
73 |
|
Patch105: qpsmtpd-0.84-fix_eq_operator.patch |
74 |
|
Patch106: qpsmtpd-0.84-remove_denysoft_on_spf_softfail.patch |
75 |
|
Patch107: qpsmtpd-0.84-notls_conf.patch |
76 |
|
Patch108: qpsmtpd-0.84-disable_sslv3.patch |
77 |
|
Patch109: qpsmtpd-0.84-make-dnsbl-more-whitelist_soft-aware.patch |
78 |
|
Patch110: qpsmtpd-0.84-disable_tlsv1.patch |
79 |
|
Patch111: qpsmtpd-0.84-deny_login_with_null.patch |
80 |
|
Patch112: qpsmtpd-0.84-allow_tls_proto_from_config.patch |
81 |
|
|
82 |
%description |
%description |
83 |
qpsmtpd is a flexible smtpd daemon written in Perl. Apart from the core |
qpsmtpd is a flexible smtpd daemon written in Perl. Apart from the core |
147 |
%patch37 -p1 |
%patch37 -p1 |
148 |
%patch38 -p1 |
%patch38 -p1 |
149 |
%patch39 -p1 |
%patch39 -p1 |
150 |
|
%patch40 -p1 |
151 |
|
|
152 |
%patch100 -p1 |
%patch100 -p1 |
153 |
%patch101 -p1 |
%patch101 -p1 |
154 |
%patch102 -p1 |
%patch102 -p1 |
155 |
%patch103 -p0 |
%patch103 -p0 |
156 |
|
%patch104 -p1 |
157 |
|
%patch105 -p1 |
158 |
|
%patch106 -p1 |
159 |
|
%patch107 -p1 |
160 |
|
%patch108 -p1 |
161 |
|
%patch109 -p1 |
162 |
|
%patch110 -p1 |
163 |
|
%patch111 -p1 |
164 |
|
%patch112 -p1 |
165 |
|
|
166 |
%build |
%build |
167 |
CFLAGS="$RPM_OPT_FLAGS" perl Makefile.PL INSTALLDIRS="vendor" PREFIX="%{buildroot}%{_prefix}" |
CFLAGS="$RPM_OPT_FLAGS" perl Makefile.PL INSTALLDIRS="vendor" PREFIX="%{buildroot}%{_prefix}" |
246 |
%pre |
%pre |
247 |
|
|
248 |
%changelog |
%changelog |
249 |
|
* Thu Jan 7 2016 Daniel Berteaud <daniel@firewall-services.com> 0.84-18.sme |
250 |
|
- Allow reading SSL_version from the tls_protocols config file (and turn |
251 |
|
TLSv1 back on by default) [SME: 9162] |
252 |
|
|
253 |
|
* Wed Jan 6 2016 Daniel Berteaud <daniel@firewall-services.com> 0.84-17.sme |
254 |
|
- Correctly log login attempts with nulls in login name [SME: 9167] |
255 |
|
|
256 |
|
* Wed Jan 6 2016 Daniel Berteaud <daniel@firewall-services.com> 0.84-16.sme |
257 |
|
- Disable TLSv1 [SME: 9162] |
258 |
|
|
259 |
|
* Fri Sep 11 2015 stephane de Labrusse <stephdl@de-labrusse.fr> 0.84-15.sme |
260 |
|
- Modify whitelist_soft transaction to interact with dnsbl filter [SME: 8747] |
261 |
|
- by John Crisp <jcrisp@safeandsoundit.co.uk> |
262 |
|
- Added qpsmtpd-0.84-make-dnsbl-more-whitelist_soft-aware.patch |
263 |
|
|
264 |
|
* Tue May 19 2015 Daniel Berteaud <daniel@firewall-services.com> 0.84-14.sme |
265 |
|
- Disable SSLv3 [SME: 8926] |
266 |
|
|
267 |
|
* Fri May 15 2015 Daniel Berteaud <daniel@firewall-services.com> 0.84-13.sme |
268 |
|
- New notls conf to set hosts you dont want to advertize STARTTLS to [SME: 8863] |
269 |
|
|
270 |
|
* Sun Feb 15 2015 Daniel Berteaud <daniel@firewall-services.com> 0.84-12.sme |
271 |
|
- Revert forcing TLSv1 patch as it breaks some inbound delivery [SME: 8851] |
272 |
|
- Revert whitelist_soft dnsbl as it hasn't been verified yet and we need to |
273 |
|
push the fix for TLSv1 [SME: 8747] |
274 |
|
|
275 |
|
* Fri Dec 26 2014 stephane de Labrusse <stephdl@de-labrusse.fr> 0.84-11.sme |
276 |
|
- Modify whitelist_soft transaction to interact with dnsbl filter [SME: 8747] |
277 |
|
- by John Crisp <jcrisp@safeandsoundit.co.uk> |
278 |
|
|
279 |
|
* Mon Dec 22 2014 Daniel Berteaud <daniel@firewall-services.com> 0.84-10.sme |
280 |
|
- Force usage of TLSv1 [SME: 8726] |
281 |
|
|
282 |
|
* Thu Mar 13 2014 Daniel Berteaud <daniel@firewall-services.com> 0.84-9.sme |
283 |
|
- Remove DENYSOFT on SPF softfail [SME: 8273] |
284 |
|
|
285 |
|
* Mon Dec 9 2013 Daniel Berteaud <daniel@firewall-services.com> 0.84-8.sme |
286 |
|
- Fix handling of messages with no body and no trailing \n after headers (eq was |
287 |
|
used in attempted assignment). [SME: 8051, see SME: 7754] |
288 |
|
|
289 |
|
* Fri Jul 5 2013 Ian Wells <esmith@wellsi.com> 0.84-7.sme |
290 |
|
- Accept messages with no body and no trailing \n after headers [SME: 7754] |
291 |
|
|
292 |
|
* Thu Apr 25 2013 chris burnat <devlist@burnat.com> 0.84-6.sme |
293 |
|
- Fix Net::DNS update breaks qpsmtpd, codes suggested by Ian [SME: 7561] |
294 |
|
|
295 |
* Wed Apr 24 2013 Daniel Berteaud <daniel@firewall-services.com> 0.84-5.sme |
* Wed Apr 24 2013 Daniel Berteaud <daniel@firewall-services.com> 0.84-5.sme |
296 |
- allows the spamassassin plugin to read the size limit from its |
- allows the spamassassin plugin to read the size limit from its |
297 |
arguments [SME: 7559] |
arguments [SME: 7559] |
312 |
* Wed Apr 14 2010 <slords@mail.com> 0.84-0.1.sme |
* Wed Apr 14 2010 <slords@mail.com> 0.84-0.1.sme |
313 |
- Update to 0.84 |
- Update to 0.84 |
314 |
- add sme specific patches |
- add sme specific patches |
315 |
|
- Perl module rpms moved to /usr/share/perl5/vendor_perl [SME: 7223] |
316 |
|
|
317 |
* Wed Mar 3 2010 <filippo.carletti@gmail.com> 0.83-0.7.sme |
* Wed Mar 3 2010 <filippo.carletti@gmail.com> 0.83-0.7.sme |
318 |
- Remove spool and log dir from package (in smeserver-qpsmtpd) |
- Remove spool and log dir from package (in smeserver-qpsmtpd) |