From 386c00128e0ee45267fde2cbc6a79d0fbc96a480 Mon Sep 17 00:00:00 2001 From: CentOS Sources Date: Nov 03 2016 06:13:48 +0000 Subject: import dovecot-2.2.10-7.el7 --- diff --git a/SOURCES/dovecot-2.0-defaultconfig.patch b/SOURCES/dovecot-2.0-defaultconfig.patch index 3f40d82..6a82efc 100644 --- a/SOURCES/dovecot-2.0-defaultconfig.patch +++ b/SOURCES/dovecot-2.0-defaultconfig.patch @@ -1,7 +1,16 @@ -diff -up dovecot-2.1.rc1/doc/example-config/conf.d/10-mail.conf.default-settings dovecot-2.1.rc1/doc/example-config/conf.d/10-mail.conf ---- dovecot-2.1.rc1/doc/example-config/conf.d/10-mail.conf.default-settings 2011-11-15 21:24:30.000000000 +0100 -+++ dovecot-2.1.rc1/doc/example-config/conf.d/10-mail.conf 2011-12-14 14:46:41.808749847 +0100 -@@ -277,6 +277,7 @@ +diff -up dovecot-2.2.10/doc/example-config/conf.d/10-mail.conf.default-settings dovecot-2.2.10/doc/example-config/conf.d/10-mail.conf +--- dovecot-2.2.10/doc/example-config/conf.d/10-mail.conf.default-settings 2013-04-23 12:33:55.000000000 +0200 ++++ dovecot-2.2.10/doc/example-config/conf.d/10-mail.conf 2016-06-17 17:56:17.353210369 +0200 +@@ -165,7 +165,7 @@ namespace inbox { + # to make sure that users can't log in as daemons or other system users. + # Note that denying root logins is hardcoded to dovecot binary and can't + # be done even if first_valid_uid is set to 0. +-#first_valid_uid = 500 ++first_valid_uid = 1000 + #last_valid_uid = 0 + + # Valid GID range for users, defaults to non-root/wheel. Users having +@@ -286,6 +286,7 @@ namespace inbox { # them simultaneously. #mbox_read_locks = fcntl #mbox_write_locks = dotlock fcntl @@ -9,9 +18,9 @@ diff -up dovecot-2.1.rc1/doc/example-config/conf.d/10-mail.conf.default-settings # Maximum time to wait for lock (all of them) before aborting. #mbox_lock_timeout = 5 mins -diff -up dovecot-2.1.rc1/doc/example-config/conf.d/10-ssl.conf.default-settings dovecot-2.1.rc1/doc/example-config/conf.d/10-ssl.conf ---- dovecot-2.1.rc1/doc/example-config/conf.d/10-ssl.conf.default-settings 2011-12-14 14:48:19.967721153 +0100 -+++ dovecot-2.1.rc1/doc/example-config/conf.d/10-ssl.conf 2011-12-14 14:51:10.413786253 +0100 +diff -up dovecot-2.2.10/doc/example-config/conf.d/10-ssl.conf.default-settings dovecot-2.2.10/doc/example-config/conf.d/10-ssl.conf +--- dovecot-2.2.10/doc/example-config/conf.d/10-ssl.conf.default-settings 2013-11-19 21:36:30.000000000 +0100 ++++ dovecot-2.2.10/doc/example-config/conf.d/10-ssl.conf 2016-06-17 17:54:18.749626750 +0200 @@ -3,7 +3,9 @@ ## diff --git a/SOURCES/dovecot-2.1.10-waitonline.patch b/SOURCES/dovecot-2.1.10-waitonline.patch index 6795504..6b5a111 100644 --- a/SOURCES/dovecot-2.1.10-waitonline.patch +++ b/SOURCES/dovecot-2.1.10-waitonline.patch @@ -1,7 +1,11 @@ -diff -up dovecot-2.1.10/dovecot.service.in.waitonline dovecot-2.1.10/dovecot.service.in ---- dovecot-2.1.10/dovecot.service.in.waitonline 2012-11-20 14:19:47.000000000 +0100 -+++ dovecot-2.1.10/dovecot.service.in 2012-11-20 14:20:29.245076250 +0100 -@@ -4,6 +4,7 @@ After=local-fs.target network.target +diff -up dovecot-2.2.10/dovecot.service.in.waitonline dovecot-2.2.10/dovecot.service.in +--- dovecot-2.2.10/dovecot.service.in.waitonline 2016-06-09 17:07:30.965683169 +0200 ++++ dovecot-2.2.10/dovecot.service.in 2016-06-09 17:08:56.257389557 +0200 +@@ -1,9 +1,10 @@ + [Unit] + Description=Dovecot IMAP/POP3 email server +-After=local-fs.target network.target ++After=local-fs.target network.target network-online.target [Service] Type=simple diff --git a/SOURCES/dovecot-2.2-e84555e6eb59.patch b/SOURCES/dovecot-2.2-e84555e6eb59.patch new file mode 100644 index 0000000..77d7809 --- /dev/null +++ b/SOURCES/dovecot-2.2-e84555e6eb59.patch @@ -0,0 +1,56 @@ + +# HG changeset patch +# User Timo Sirainen +# Date 1399020005 -10800 +# Node ID e84555e6eb5927cf128d47bd324c83fdedc2cfeb +# Parent 99f59d6fce05bc6957c1f540de45bbe0eeb47738 +auth: Fixed userdb extra fields handling in passdb failure. +userdb prefetch -flag wasn't correctly set, causing the prefetch userdb in +some situations incorrectly either to be called or not be called. + +This also fixes a crash when using userdb static and multiple passdbs. The +userdb_reply was set to NULL, which caused a crash later. + +diff -r 99f59d6fce05 -r e84555e6eb59 src/auth/auth-request.c +--- a/src/auth/auth-request.c Fri May 02 11:12:58 2014 +0300 ++++ b/src/auth/auth-request.c Fri May 02 11:40:05 2014 +0300 +@@ -625,21 +625,18 @@ + /* this passdb lookup succeeded, preserve its extra + fields */ + auth_fields_snapshot(request->extra_fields); +- request->snapshot_has_userdb_reply = +- request->userdb_reply != NULL; ++ request->snapshot_have_userdb_prefetch_set = ++ request->userdb_prefetch_set; + if (request->userdb_reply != NULL) + auth_fields_snapshot(request->userdb_reply); + } else { + /* this passdb lookup failed, remove any extra fields + it set */ + auth_fields_rollback(request->extra_fields); +- if (request->userdb_reply == NULL) +- ; +- else if (request->snapshot_has_userdb_reply) ++ if (request->userdb_reply != NULL) { + auth_fields_rollback(request->userdb_reply); +- else { +- request->userdb_reply = NULL; +- request->userdb_prefetch_set = FALSE; ++ request->userdb_prefetch_set = ++ request->snapshot_have_userdb_prefetch_set; + } + } + +diff -r 99f59d6fce05 -r e84555e6eb59 src/auth/auth-request.h +--- a/src/auth/auth-request.h Fri May 02 11:12:58 2014 +0300 ++++ b/src/auth/auth-request.h Fri May 02 11:40:05 2014 +0300 +@@ -124,7 +124,7 @@ + unsigned int prefer_plain_credentials:1; + unsigned int in_delayed_failure_queue:1; + unsigned int removed_from_handler:1; +- unsigned int snapshot_has_userdb_reply:1; ++ unsigned int snapshot_have_userdb_prefetch_set:1; + /* each passdb lookup can update the current success-status using the + result_* rules. the authentication succeeds only if this is TRUE + at the end. mechanisms that don't require passdb, but do a passdb + diff --git a/SOURCES/dovecot-2.2.10-0e1a3c909a13.patch b/SOURCES/dovecot-2.2.10-0e1a3c909a13.patch new file mode 100644 index 0000000..78a1b69 --- /dev/null +++ b/SOURCES/dovecot-2.2.10-0e1a3c909a13.patch @@ -0,0 +1,44 @@ + +# HG changeset patch +# User Timo Sirainen +# Date 1412862083 -10800 +# Node ID 0e1a3c909a137edd2ad2c133d71eee7f565265bf +# Parent 90fbf199ebdaeb3a3a4863f0897cbeec17a19105 +lib-storage: Fixed header parsing when there were multiple same header names. +For example if a mail had: + +Name1: a +Name1: b +Name2: c + +If the Name1: was initially added to cache and Name2: not, but later on both +were attempted to be added to cache, the Name2: lookup would have been added +with "b" instead of "c" value. + +diff -r 90fbf199ebda -r 0e1a3c909a13 src/lib-storage/index/index-mail-headers.c +--- a/src/lib-storage/index/index-mail-headers.c Thu Oct 09 12:02:21 2014 +0300 ++++ b/src/lib-storage/index/index-mail-headers.c Thu Oct 09 16:41:23 2014 +0300 +@@ -71,6 +71,7 @@ + + if (match_idx < match_count) { + /* save index to first header line */ ++ i_assert(match_idx == lines[i].field_idx); + j = i + 1; + array_idx_set(&mail->header_match_lines, match_idx, &j); + match_idx++; +@@ -78,8 +79,12 @@ + + if (!mail_cache_field_can_add(_mail->transaction->cache_trans, + _mail->seq, lines[i].field_idx)) { +- /* header is already cached */ +- j = i + 1; ++ /* header is already cached. skip over all the ++ header lines. */ ++ for (j = i+1; j < count; j++) { ++ if (lines[j].field_idx != lines[i].field_idx) ++ break; ++ } + continue; + } + + diff --git a/SOURCES/dovecot-2.2.10-b8864211b88ed7521e9af514590639344af38910.patch b/SOURCES/dovecot-2.2.10-b8864211b88ed7521e9af514590639344af38910.patch new file mode 100644 index 0000000..62267c8 --- /dev/null +++ b/SOURCES/dovecot-2.2.10-b8864211b88ed7521e9af514590639344af38910.patch @@ -0,0 +1,28 @@ +From b8864211b88ed7521e9af514590639344af38910 Mon Sep 17 00:00:00 2001 +From: Timo Sirainen +Date: Wed, 28 May 2014 18:17:52 +0300 +Subject: [PATCH] lib-index: Fixed somewhat random assert-crashes during + extension resizes. + +--- + src/lib-index/mail-index-transaction-export.c | 6 +++--- + 1 file changed, 3 insertions(+), 3 deletions(-) + +diff --git a/src/lib-index/mail-index-transaction-export.c b/src/lib-index/mail-index-transaction-export.c +index a698674..2ad8565 100644 +--- a/src/lib-index/mail-index-transaction-export.c ++++ b/src/lib-index/mail-index-transaction-export.c +@@ -114,10 +114,10 @@ static void log_append_ext_intro(struct mail_index_export_context *ctx, + /* we're resizing the extension. use the resize struct. */ + intro = &resizes[ext_id]; + +- i_assert(intro->ext_id == idx || idx == (uint32_t)-1); +- if (idx != (uint32_t)-1) ++ if (idx != (uint32_t)-1) { ++ intro->ext_id = idx; + intro->name_size = 0; +- else { ++ } else { + intro->ext_id = (uint32_t)-1; + intro->name_size = strlen(rext->name); + } diff --git a/SOURCES/dovecot-2.2.10-ed6e472cab0e.patch b/SOURCES/dovecot-2.2.10-ed6e472cab0e.patch new file mode 100644 index 0000000..4473f17 --- /dev/null +++ b/SOURCES/dovecot-2.2.10-ed6e472cab0e.patch @@ -0,0 +1,82 @@ + +# HG changeset patch +# User Timo Sirainen +# Date 1399469814 -10800 +# Node ID ed6e472cab0e1b961bddcabdaf7c33c85503079a +# Parent 2e7ac48c6072d8490b64e145323664b5697b9701 +mdbox: Fixed race condition when creating a new mailbox and another process getting its GUID. + +diff -r 2e7ac48c6072 -r ed6e472cab0e src/lib-storage/index/dbox-common/dbox-storage.c +--- a/src/lib-storage/index/dbox-common/dbox-storage.c Wed May 07 13:02:29 2014 +0300 ++++ b/src/lib-storage/index/dbox-common/dbox-storage.c Wed May 07 16:36:54 2014 +0300 +@@ -255,9 +255,6 @@ + const struct mailbox_update *update, bool directory) + { + struct dbox_storage *storage = (struct dbox_storage *)box->storage; +- struct mail_index_sync_ctx *sync_ctx; +- struct mail_index_view *view; +- struct mail_index_transaction *trans; + const char *alt_path; + struct stat st; + int ret; +@@ -290,6 +287,17 @@ + } + /* dir is empty, ignore it */ + } ++ return dbox_mailbox_create_indexes(box, update); ++} ++ ++int dbox_mailbox_create_indexes(struct mailbox *box, ++ const struct mailbox_update *update) ++{ ++ struct dbox_storage *storage = (struct dbox_storage *)box->storage; ++ struct mail_index_sync_ctx *sync_ctx; ++ struct mail_index_view *view; ++ struct mail_index_transaction *trans; ++ int ret; + + /* use syncing as a lock */ + ret = mail_index_sync_begin(box->index, &sync_ctx, &view, &trans, 0); +diff -r 2e7ac48c6072 -r ed6e472cab0e src/lib-storage/index/dbox-common/dbox-storage.h +--- a/src/lib-storage/index/dbox-common/dbox-storage.h Wed May 07 13:02:29 2014 +0300 ++++ b/src/lib-storage/index/dbox-common/dbox-storage.h Wed May 07 16:36:54 2014 +0300 +@@ -73,6 +73,8 @@ + int dbox_mailbox_open(struct mailbox *box); + int dbox_mailbox_create(struct mailbox *box, + const struct mailbox_update *update, bool directory); ++int dbox_mailbox_create_indexes(struct mailbox *box, ++ const struct mailbox_update *update); + int dbox_verify_alt_storage(struct mailbox_list *list); + bool dbox_header_have_flag(struct mailbox *box, uint32_t ext_id, + unsigned int flags_offset, uint8_t flag); +diff -r 2e7ac48c6072 -r ed6e472cab0e src/lib-storage/index/dbox-multi/mdbox-storage.c +--- a/src/lib-storage/index/dbox-multi/mdbox-storage.c Wed May 07 13:02:29 2014 +0300 ++++ b/src/lib-storage/index/dbox-multi/mdbox-storage.c Wed May 07 16:36:54 2014 +0300 +@@ -379,10 +379,15 @@ + + /* there's a race condition between mkdir and getting the mailbox GUID. + normally this is handled by mdbox syncing, but GUID can be looked up +- without syncing. when mbox->creating=TRUE, the errors are hidden +- and we'll simply finish the mailbox creation */ ++ without syncing. when we detect this situation we'll try to finish ++ creating the indexes first, which usually means just waiting for ++ the sync lock to get unlocked by the other process creating them. */ + idx_hdr = mail_index_get_header(mbox->box.view); +- mbox->creating = idx_hdr->uid_validity == 0 && idx_hdr->next_uid == 1; ++ if (idx_hdr->uid_validity == 0 && idx_hdr->next_uid == 1) { ++ if (dbox_mailbox_create_indexes(&mbox->box, NULL) < 0) ++ return -1; ++ } ++ + if (mdbox_read_header(mbox, &hdr, &need_resize) < 0) + memset(&hdr, 0, sizeof(hdr)); + +@@ -394,7 +399,6 @@ + } + if (ret == 0) + memcpy(guid_r, hdr.mailbox_guid, GUID_128_SIZE); +- mbox->creating = FALSE; + return ret; + } + + diff --git a/SOURCES/dovecot-2.2.10-valgrindlog.patch b/SOURCES/dovecot-2.2.10-valgrindlog.patch new file mode 100644 index 0000000..8a3d3f3 --- /dev/null +++ b/SOURCES/dovecot-2.2.10-valgrindlog.patch @@ -0,0 +1,12 @@ +diff -up dovecot-2.2.10/run-test.sh.valgrindlog dovecot-2.2.10/run-test.sh +--- dovecot-2.2.10/run-test.sh.valgrindlog 2016-06-17 17:53:22.685823573 +0200 ++++ dovecot-2.2.10/run-test.sh 2016-06-17 17:54:06.303670444 +0200 +@@ -2,7 +2,7 @@ + + trap "rm -f test.out.$$" 0 1 2 3 15 + +-if valgrind --version | grep '^valgrind-3.[012]'; then ++if valgrind -q --log-file-exactly=/dev/null /bin/true >/dev/null 2>&1; then + # RHEL 5.4 still has Valgrind v3.2 + valgrind -q --log-file-exactly=test.out.$$ $* + ret=$? diff --git a/SOURCES/dovecot-pigeonhole-2.2.10-b6c55ac6460d.patch b/SOURCES/dovecot-pigeonhole-2.2.10-b6c55ac6460d.patch new file mode 100644 index 0000000..bfdd852 --- /dev/null +++ b/SOURCES/dovecot-pigeonhole-2.2.10-b6c55ac6460d.patch @@ -0,0 +1,84 @@ + +# HG changeset patch +# User Stephan Bosch +# Date 1419976864 -3600 +# Node ID b6c55ac6460d6e9d7c8784d7e0b9c0bd5ce160aa +# Parent c9698bc1751a70a808c286d43728e79b35c6ade7 +lib-sieve: Fixed crash in validation of the string parameter of the comparator tag. +It couldn't handle a missing parameter (which also means missing arguments of the test itself in most cases). +This is fixed by using the sieve_validate_tag_parameter() utility function. +Testsuite is also extended. + +diff -r c9698bc1751a -r b6c55ac6460d src/lib-sieve/sieve-comparators.c +--- a/src/lib-sieve/sieve-comparators.c Tue Dec 30 22:57:07 2014 +0100 ++++ b/src/lib-sieve/sieve-comparators.c Tue Dec 30 23:01:04 2014 +0100 +@@ -140,16 +140,11 @@ + /* Check syntax: + * ":comparator" + */ +- if ( (*arg)->type != SAAT_STRING ) { +- sieve_argument_validate_error(valdtr, *arg, +- ":comparator tag requires one string argument, but %s was found", +- sieve_ast_argument_name(*arg) ); ++ if ( !sieve_validate_tag_parameter ++ (valdtr, cmd, tag, *arg, NULL, 0, SAAT_STRING, FALSE) ) { + return FALSE; + } + +- if ( !sieve_validator_argument_activate(valdtr, cmd, *arg, FALSE) ) +- return FALSE; +- + /* FIXME: We can currently only handle string literal argument, so + * variables are not allowed. + */ +diff -r c9698bc1751a -r b6c55ac6460d tests/compile/errors.svtest +--- a/tests/compile/errors.svtest Tue Dec 30 22:57:07 2014 +0100 ++++ b/tests/compile/errors.svtest Tue Dec 30 23:01:04 2014 +0100 +@@ -243,6 +243,20 @@ + } + + /* ++ * COMPARATOR errors ++ */ ++ ++test "COMPARATOR errors (FIXME: count only)" { ++ if test_script_compile "errors/comparator.sieve" { ++ test_fail "compile should have failed."; ++ } ++ ++ if not test_error :count "eq" :comparator "i;ascii-numeric" "6" { ++ test_fail "wrong number of errors reported"; ++ } ++} ++ ++/* + * ADDRESS-PART errors + */ + +diff -r c9698bc1751a -r b6c55ac6460d tests/compile/errors/comparator.sieve +--- /dev/null Thu Jan 01 00:00:00 1970 +0000 ++++ b/tests/compile/errors/comparator.sieve Tue Dec 30 23:01:04 2014 +0100 +@@ -0,0 +1,21 @@ ++/* ++ * Address part errors ++ * ++ * Total errors: 5 (+1 = 6) ++ */ ++ ++# 1: No argument ++if address :comparator { } ++ ++# 2: Number argument ++if address :comparator 1 "from" "frop" { } ++ ++# 3: String list argument ++if address :comparator ["a", "b"] "from" "frop" { } ++ ++# 4: Unknown tag ++if address :comparator :frop "from" "frop" { } ++ ++# 5: Known tag ++if address :comparator :all "from" "frop" { } ++ + + diff --git a/SPECS/dovecot.spec b/SPECS/dovecot.spec index 03095d1..f1cfdee 100644 --- a/SPECS/dovecot.spec +++ b/SPECS/dovecot.spec @@ -5,7 +5,7 @@ Name: dovecot Epoch: 1 Version: 2.2.10 %global prever %{nil} -Release: 5%{?dist} +Release: 7%{?dist} #dovecot itself is MIT, a few sources are PD, pigeonhole is LGPLv2 License: MIT and LGPLv2 Group: System Environment/Daemons @@ -41,13 +41,27 @@ Patch7: dovecot-2.2.9-nodevrand.patch # dovecot < 2.2.13, rhbz#1096402,rhbz#1108004 Patch8: dovecot-2.2.10-CVE_2014_3430.patch +Patch9: dovecot-pigeonhole-2.2.10-b6c55ac6460d.patch + +# from upstream, for dovecot < 2.2.13, rhbz#1234868 +Patch10: dovecot-2.2-e84555e6eb59.patch + +# rhbz#1249625 +Patch11: dovecot-2.2.10-valgrindlog.patch + +# 2x rhbz#1331478 +Patch12: dovecot-2.2.10-ed6e472cab0e.patch +Patch13: dovecot-2.2.10-b8864211b88ed7521e9af514590639344af38910.patch + +# dovecot < 2.2.14, rhbz#1224496 +Patch14: dovecot-2.2.10-0e1a3c909a13.patch Source15: prestartscript Buildroot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n) -BuildRequires: openssl-devel, pam-devel, zlib-devel, bzip2-devel, libcap-devel +BuildRequires: openssl-devel, pam-devel, zlib-devel, bzip2-devel, xz-devel, libcap-devel BuildRequires: libtool, autoconf, automake, pkgconfig -BuildRequires: sqlite-devel +BuildRequires: sqlite-devel, tcp_wrappers-devel BuildRequires: postgresql-devel BuildRequires: mysql-devel BuildRequires: openldap-devel @@ -123,6 +137,13 @@ Group: System Environment/Daemons %description mysql This package provides the MySQL back end for dovecot-auth etc. +%package devel +Requires: %{name} = %{epoch}:%{version}-%{release} +Summary: Development files for dovecot +Group: Development/Libraries +%description devel +This package provides the development files for dovecot. + %prep %setup -q -n %{name}-%{version}%{?prever} -a 8 %patch1 -p1 -b .default-settings @@ -133,7 +154,16 @@ This package provides the MySQL back end for dovecot-auth etc. %patch6 -p1 -b .waitonline %patch7 -p1 -b .nodevrand %patch8 -p1 -b .CVE_2014_3430 +%patch10 -p1 -b .e84555e6eb59 +%patch11 -p1 -b .valgrindlog +%patch12 -p1 -b .ed6e472cab0e +%patch13 -p1 -b .b8864211b88ed7521e9af514590639344af38910 +%patch14 -p1 -b .0e1a3c909a13 sed -i '/DEFAULT_INCLUDES *=/s|$| '"$(pkg-config --cflags libclucene-core)|" src/plugins/fts-lucene/Makefile.in +#pigeonhole +pushd dovecot-2*2-pigeonhole-%{pigeonholever} +%patch9 -p1 -b .2.2.10-b6c55ac6460d +popd %build #required for fdpass.c line 125,190: dereferencing type-punned pointer will break strict-aliasing rules @@ -155,6 +185,7 @@ autoreconf -I . -fiv #required for aarch64 support --with-pgsql \ --with-mysql \ --with-sqlite \ + --with-lzma \ --with-zlib \ --with-libcap \ %if %{?fedora}0 > 150 || %{?rhel}0 >60 @@ -166,7 +197,8 @@ autoreconf -I . -fiv #required for aarch64 support %if %{?fedora}0 > 140 || %{?rhel}0 > 60 --with-systemdsystemunitdir=%{_unitdir} \ %endif - --with-docs + --with-docs \ + --with-libwrap sed -i 's|/etc/ssl|/etc/pki/dovecot|' doc/mkcert.sh doc/example-config/conf.d/10-ssl.conf @@ -257,11 +289,6 @@ pushd docinstall rm -f securecoding.txt thread-refs.txt popd -#drop -devel files -rm -rf $RPM_BUILD_ROOT/%{_includedir}/dovecot -rm -f $RPM_BUILD_ROOT/%{_datadir}/aclocal/dovecot.m4 -rm -f $RPM_BUILD_ROOT/%{_libdir}/dovecot/libdovecot*.so -rm -f $RPM_BUILD_ROOT/%{_libdir}/dovecot/dovecot-config %clean rm -rf $RPM_BUILD_ROOT @@ -312,7 +339,7 @@ fi install -d -m 0755 -g dovecot -d /var/run/dovecot install -d -m 0755 -d /var/run/dovecot/empty install -d -m 0750 -g dovenull /var/run/dovecot/login -[ -x /sbin/restorecon ] && /sbin/restorecon -R /var/run/dovecot +/sbin/restorecon -R /var/run/dovecot 2>/dev/null || : %preun if [ $1 = 0 ]; then @@ -483,7 +510,30 @@ make check %{_libdir}/%{name}/auth/libdriver_pgsql.so %{_libdir}/%{name}/dict/libdriver_pgsql.so +%files devel +%{_includedir}/dovecot +%{_datadir}/aclocal/dovecot*.m4 +%{_libdir}/dovecot/libdovecot*.so +%{_libdir}/dovecot/dovecot-config + + %changelog +* Thu Jun 09 2016 Michal Hlavinka - 1:2.2.10-7 +- prevent warning messages from %%post section if selinux-policy is + not installed (yet) (#1057522) +- compile with xz compression support enabled (#1176214) +- fix crash in sieve script compilation (#1177852) +- wait with start after network-online target (#1209006) +- build with tcp wrappers enabled (#1229164) +- fixed userdb extra fields handling in passdb failure (#1234868) +- fix valgrind option detection for make check (#1249625) +- first valid regular user id is 1000 (#1280433) +- fixed race condition when creating a new mailbox and another process getting its GUID (#1331478) +- fixed header parsing when there were multiple same header names (#1224496) + +* Mon Jun 06 2016 Michal Hlavinka - 1:2.2.10-6 +- add devel sub-package (#1122676) + * Wed Jun 11 2014 Michal Hlavinka - 1:2.2.10-5 - fix CVE-2014-3430: denial of service through maxxing out SSL connections (#1108004)