--- rpms/qpsmtpd/sme9/qpsmtpd.spec 2013/04/24 18:03:34 1.2 +++ rpms/qpsmtpd/sme9/qpsmtpd.spec 2013/04/25 07:21:05 1.3 @@ -1,8 +1,8 @@ -# $Id: qpsmtpd.spec,v 1.1 2013/02/02 00:59:45 slords Exp $ +# $Id: qpsmtpd.spec,v 1.2 2013/04/24 18:03:34 vip-ire Exp $ Name: qpsmtpd Version: 0.84 -Release: 5%{?dist} +Release: 6%{?dist} Summary: qpsmtpd + qpsmtpd-apache + qpsmtpd-async License: MIT Group: System Environment/Daemons @@ -62,6 +62,7 @@ Patch36: 0036-prefork-use-new-instance-i Patch37: 0037-Revert-Spool-body-when-transaction-body_fh-is-called.patch Patch38: 0038-Patch-FATAL-PLUGIN-ERROR-check_basicheaders.patch Patch39: 0039-qpsmtpd-0.84-spamassassin_size_limit.patch +Patch40: 0040-qpsmtpd-forkserver_fix_Net_DNS_update_breaks_qpsmtpd.patch Patch100: qpsmtpd-0.40-badrcptto_allowrelay.patch Patch101: qpsmtpd-0.83-peer_hooks.patch @@ -136,6 +137,7 @@ qpsmpd-async which uses it. %patch37 -p1 %patch38 -p1 %patch39 -p1 +%patch40 -p1 %patch100 -p1 %patch101 -p1 @@ -225,6 +227,9 @@ fi %pre %changelog +* Thu Apr 25 2013 chris burnat 0.84-6.sme +- Fix Net::DNS update breaks qpsmtpd, codes suggested by Ian [SME: 7561] + * Wed Apr 24 2013 Daniel Berteaud 0.84-5.sme - allows the spamassassin plugin to read the size limit from its arguments [SME: 7559]