1 |
# $Id: smeserver-qpsmtpd.spec,v 1.32 2017/04/12 21:32:49 unnilennium Exp $ |
# $Id: smeserver-qpsmtpd.spec,v 1.39 2020/06/28 04:00:44 jpp Exp $ |
2 |
|
|
3 |
Summary: SME Server qpsmtpd module |
Summary: SME Server qpsmtpd module |
4 |
%define name smeserver-qpsmtpd |
%define name smeserver-qpsmtpd |
5 |
Name: %{name} |
Name: %{name} |
6 |
%define version 2.6.0 |
%define version 2.6.0 |
7 |
%define release 30 |
%define release 37 |
8 |
Version: %{version} |
Version: %{version} |
9 |
Release: %{release}%{?dist} |
Release: %{release}%{?dist} |
10 |
License: GPL |
License: GPL |
41 |
Patch28: smeserver-qpsmtpd-2.6.0-fix_disabling_dmarc_reports.patch |
Patch28: smeserver-qpsmtpd-2.6.0-fix_disabling_dmarc_reports.patch |
42 |
Patch29: smeserver-qpsmtpd-2.6.0-spf_and_dmarc_reject_off.patch |
Patch29: smeserver-qpsmtpd-2.6.0-spf_and_dmarc_reject_off.patch |
43 |
Patch30: smeserver-qpsmtpd-2.6.0-disable_dmarc_report.patch |
Patch30: smeserver-qpsmtpd-2.6.0-disable_dmarc_report.patch |
44 |
|
Patch31: smeserver-qpsmtpd-2.6.0-log_dmarc_send_reports_output.patch |
45 |
|
Patch32: smeserver-qpsmtpd-2.6.0-bz10290-forcespamcheck.patch |
46 |
|
Patch33: smeserver-qpsmtpd-2.6.0-bz10460-better-Cipher-and-Protocol.patch |
47 |
|
Patch34: smeserver-qpsmtpd-2.6.0-bz10368-expand-badrcptto_ext.patch |
48 |
|
Patch35: smeserver-qpsmtpd-2.6.0-bz11107_11164_systemd_update_event.patch |
49 |
BuildRoot: /var/tmp/%{name}-%{version}-%{release}-buildroot |
BuildRoot: /var/tmp/%{name}-%{version}-%{release}-buildroot |
50 |
Requires: qpsmtpd >= 0.96 |
Requires: qpsmtpd >= 0.96-19 |
51 |
Requires: perl(Mail::DKIM) |
Requires: perl(Mail::DKIM) |
52 |
Requires: perl(Mail::DKIM::DkSignature) |
Requires: perl(Mail::DKIM::DkSignature) |
53 |
Requires: perl(ClamAV::Client) |
Requires: perl(ClamAV::Client) |
79 |
SME Server qpsmtpd smtpd module |
SME Server qpsmtpd smtpd module |
80 |
|
|
81 |
%changelog |
%changelog |
82 |
|
* Fri Nov 27 2020 Michel Begue <mab974@gmail.com> 2.6.0-37.sme |
83 |
|
- Move qpsmtpd & sqpsmtpd services to systemd [SME: 11107] |
84 |
|
- Create smeserver-qpsmtpd-update event [SME: 11164] |
85 |
|
|
86 |
|
* Sat Jun 27 2020 Jean-Philipe Pialasse <tests@pialasse.com> 2.6.0-36.sme |
87 |
|
- expand badrcptto_ext when needed [SME: 10638] |
88 |
|
this avoid user, group or pseudonyms for internal purpose to be reachable |
89 |
|
from outside |
90 |
|
|
91 |
|
* Sat May 02 2020 Jean-Philipe Pialasse <tests@pialasse.com> 2.6.0-34.sme |
92 |
|
- minimum Protocol TLSv1.0 [SME: 10460] |
93 |
|
better ciphers order. |
94 |
|
|
95 |
|
* Sun Mar 11 2018 Jean-Philipe Pialasse <tests@pialasse.com> 2.6.0-32.sme |
96 |
|
- add forcespamcheck support for fetchmail [SME: 10290] |
97 |
|
|
98 |
|
* Thu Aug 3 2017 Daniel Berteaud <daniel@firewall-services.com> 2.6.0-31.sme |
99 |
|
- Log DMARC reporting in syslog instead of sending email to the admin. |
100 |
|
Also suppress SSL connection failed warnings [SME: 10298] |
101 |
|
|
102 |
* Sat May 20 2017 Daniel Berteaud <daniel@firewall-services.com> 2.6.0-30.sme |
* Sat May 20 2017 Daniel Berteaud <daniel@firewall-services.com> 2.6.0-30.sme |
103 |
- Turn DMARC reporting off by default [SME: 10303] |
- Turn DMARC reporting off by default [SME: 10303] |
104 |
|
|
924 |
%patch28 -p1 |
%patch28 -p1 |
925 |
%patch29 -p1 |
%patch29 -p1 |
926 |
%patch30 -p1 |
%patch30 -p1 |
927 |
|
%patch31 -p1 |
928 |
|
%patch32 -p1 |
929 |
|
%patch33 -p1 |
930 |
|
%patch34 -p1 |
931 |
|
%patch35 -p1 |
932 |
|
|
933 |
%build |
%build |
934 |
perl createlinks |
perl createlinks |