1 |
# $Id: smeserver-qpsmtpd.spec,v 1.32 2017/04/12 21:32:49 unnilennium Exp $ |
# $Id: smeserver-qpsmtpd.spec,v 1.41 2020/12/06 21:27:14 jpp Exp $ |
2 |
|
|
3 |
Summary: SME Server qpsmtpd module |
Summary: SME Server qpsmtpd module |
4 |
%define name smeserver-qpsmtpd |
%define name smeserver-qpsmtpd |
5 |
Name: %{name} |
Name: %{name} |
6 |
%define version 2.6.0 |
%define version 2.6.0 |
7 |
%define release 30 |
%define release 39 |
8 |
Version: %{version} |
Version: %{version} |
9 |
Release: %{release}%{?dist} |
Release: %{release}%{?dist} |
10 |
License: GPL |
License: GPL |
41 |
Patch28: smeserver-qpsmtpd-2.6.0-fix_disabling_dmarc_reports.patch |
Patch28: smeserver-qpsmtpd-2.6.0-fix_disabling_dmarc_reports.patch |
42 |
Patch29: smeserver-qpsmtpd-2.6.0-spf_and_dmarc_reject_off.patch |
Patch29: smeserver-qpsmtpd-2.6.0-spf_and_dmarc_reject_off.patch |
43 |
Patch30: smeserver-qpsmtpd-2.6.0-disable_dmarc_report.patch |
Patch30: smeserver-qpsmtpd-2.6.0-disable_dmarc_report.patch |
44 |
|
Patch31: smeserver-qpsmtpd-2.6.0-log_dmarc_send_reports_output.patch |
45 |
|
Patch32: smeserver-qpsmtpd-2.6.0-bz10290-forcespamcheck.patch |
46 |
|
Patch33: smeserver-qpsmtpd-2.6.0-bz10460-better-Cipher-and-Protocol.patch |
47 |
|
Patch34: smeserver-qpsmtpd-2.6.0-bz10368-expand-badrcptto_ext.patch |
48 |
|
Patch35: smeserver-qpsmtpd-2.6.0-bz11107_11164_systemd_update_event.patch |
49 |
|
Patch36: smeserver-qpsmtpd-2.6.0-bz11107-fix.patch |
50 |
|
|
51 |
BuildRoot: /var/tmp/%{name}-%{version}-%{release}-buildroot |
BuildRoot: /var/tmp/%{name}-%{version}-%{release}-buildroot |
52 |
Requires: qpsmtpd >= 0.96 |
Requires: qpsmtpd >= 0.96-19 |
53 |
Requires: perl(Mail::DKIM) |
Requires: perl(Mail::DKIM) |
54 |
Requires: perl(Mail::DKIM::DkSignature) |
Requires: perl(Mail::DKIM::DkSignature) |
55 |
Requires: perl(ClamAV::Client) |
Requires: perl(ClamAV::Client) |
81 |
SME Server qpsmtpd smtpd module |
SME Server qpsmtpd smtpd module |
82 |
|
|
83 |
%changelog |
%changelog |
84 |
|
* Sun Dec 06 2020 Jean-Philipe Pialasse <tests@pialasse.com> 2.6.0-39.sme |
85 |
|
- fix service not enabled [SME: 11107] |
86 |
|
remove reset-unsavedflag |
87 |
|
|
88 |
|
* Fri Nov 27 2020 Michel Begue <mab974@gmail.com> 2.6.0-37.sme |
89 |
|
- Move qpsmtpd & sqpsmtpd services to systemd [SME: 11107] |
90 |
|
- Create smeserver-qpsmtpd-update event [SME: 11164] |
91 |
|
|
92 |
|
* Sat Jun 27 2020 Jean-Philipe Pialasse <tests@pialasse.com> 2.6.0-36.sme |
93 |
|
- expand badrcptto_ext when needed [SME: 10638] |
94 |
|
this avoid user, group or pseudonyms for internal purpose to be reachable |
95 |
|
from outside |
96 |
|
|
97 |
|
* Sat May 02 2020 Jean-Philipe Pialasse <tests@pialasse.com> 2.6.0-34.sme |
98 |
|
- minimum Protocol TLSv1.0 [SME: 10460] |
99 |
|
better ciphers order. |
100 |
|
|
101 |
|
* Sun Mar 11 2018 Jean-Philipe Pialasse <tests@pialasse.com> 2.6.0-32.sme |
102 |
|
- add forcespamcheck support for fetchmail [SME: 10290] |
103 |
|
|
104 |
|
* Thu Aug 3 2017 Daniel Berteaud <daniel@firewall-services.com> 2.6.0-31.sme |
105 |
|
- Log DMARC reporting in syslog instead of sending email to the admin. |
106 |
|
Also suppress SSL connection failed warnings [SME: 10298] |
107 |
|
|
108 |
* Sat May 20 2017 Daniel Berteaud <daniel@firewall-services.com> 2.6.0-30.sme |
* Sat May 20 2017 Daniel Berteaud <daniel@firewall-services.com> 2.6.0-30.sme |
109 |
- Turn DMARC reporting off by default [SME: 10303] |
- Turn DMARC reporting off by default [SME: 10303] |
110 |
|
|
930 |
%patch28 -p1 |
%patch28 -p1 |
931 |
%patch29 -p1 |
%patch29 -p1 |
932 |
%patch30 -p1 |
%patch30 -p1 |
933 |
|
%patch31 -p1 |
934 |
|
%patch32 -p1 |
935 |
|
%patch33 -p1 |
936 |
|
%patch34 -p1 |
937 |
|
%patch35 -p1 |
938 |
|
%patch36 -p1 |
939 |
|
|
940 |
%build |
%build |
941 |
perl createlinks |
perl createlinks |