1 |
# $Id: qpsmtpd.spec,v 1.1 2013/02/02 00:59:45 slords Exp $ |
# $Id: qpsmtpd.spec,v 1.2 2013/04/24 18:03:34 vip-ire Exp $ |
2 |
|
|
3 |
Name: qpsmtpd |
Name: qpsmtpd |
4 |
Version: 0.84 |
Version: 0.84 |
5 |
Release: 5%{?dist} |
Release: 6%{?dist} |
6 |
Summary: qpsmtpd + qpsmtpd-apache + qpsmtpd-async |
Summary: qpsmtpd + qpsmtpd-apache + qpsmtpd-async |
7 |
License: MIT |
License: MIT |
8 |
Group: System Environment/Daemons |
Group: System Environment/Daemons |
62 |
Patch37: 0037-Revert-Spool-body-when-transaction-body_fh-is-called.patch |
Patch37: 0037-Revert-Spool-body-when-transaction-body_fh-is-called.patch |
63 |
Patch38: 0038-Patch-FATAL-PLUGIN-ERROR-check_basicheaders.patch |
Patch38: 0038-Patch-FATAL-PLUGIN-ERROR-check_basicheaders.patch |
64 |
Patch39: 0039-qpsmtpd-0.84-spamassassin_size_limit.patch |
Patch39: 0039-qpsmtpd-0.84-spamassassin_size_limit.patch |
65 |
|
Patch40: 0040-qpsmtpd-forkserver_fix_Net_DNS_update_breaks_qpsmtpd.patch |
66 |
|
|
67 |
Patch100: qpsmtpd-0.40-badrcptto_allowrelay.patch |
Patch100: qpsmtpd-0.40-badrcptto_allowrelay.patch |
68 |
Patch101: qpsmtpd-0.83-peer_hooks.patch |
Patch101: qpsmtpd-0.83-peer_hooks.patch |
137 |
%patch37 -p1 |
%patch37 -p1 |
138 |
%patch38 -p1 |
%patch38 -p1 |
139 |
%patch39 -p1 |
%patch39 -p1 |
140 |
|
%patch40 -p1 |
141 |
|
|
142 |
%patch100 -p1 |
%patch100 -p1 |
143 |
%patch101 -p1 |
%patch101 -p1 |
227 |
%pre |
%pre |
228 |
|
|
229 |
%changelog |
%changelog |
230 |
|
* Thu Apr 25 2013 chris burnat <devlist@burnat.com> 0.84-6.sme |
231 |
|
- Fix Net::DNS update breaks qpsmtpd, codes suggested by Ian [SME: 7561] |
232 |
|
|
233 |
* Wed Apr 24 2013 Daniel Berteaud <daniel@firewall-services.com> 0.84-5.sme |
* Wed Apr 24 2013 Daniel Berteaud <daniel@firewall-services.com> 0.84-5.sme |
234 |
- allows the spamassassin plugin to read the size limit from its |
- allows the spamassassin plugin to read the size limit from its |
235 |
arguments [SME: 7559] |
arguments [SME: 7559] |