pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/mail mail/postfix: update to 3.5.1



details:   https://anonhg.NetBSD.org/pkgsrc/rev/86a179a8bd64
branches:  trunk
changeset: 428234:86a179a8bd64
user:      taca <taca%pkgsrc.org@localhost>
date:      Sun Apr 26 09:33:25 2020 +0000

description:
mail/postfix: update to 3.5.1

Update postfix to 3.5.1.


3.5.0 (2020-03-16)

Postfix stable release 3.5.0 is available. Support has ended for
legacy release Postfix 3.1.

The main changes are below. See the RELEASE_NOTES file for further details.

  * Support for the haproxy v2 protocol. The Postfix implementation
    supports TCP over IPv4 and IPv6, as well as non-proxied
    connections; the latter are typically used for heartbeat tests.

  * Support to force-expire email messages. This introduces new
    postsuper(1) command-line options to request expiration, and
    additional information in mailq(1) or postqueue(1) output.

  * The Postfix SMTP and LMTP client support a list of nexthop
    destinations separated by comma or whitespace. These destinations
    will be tried in the specified order. Examples:

    /etc/postfix/main.cf:
        relayhost = foo.example, bar.example
        default_transport = smtp:foo.example, bar.example

Incompatible changes:

  * Logging: Postfix daemon processes now log the from= and to=
    addresses in external (quoted) form in non-debug logging (info,
    warning, etc.). This means that when an address localpart
    contains spaces or other special characters, the localpart will
    be quoted, for example:

        from=<"name with spaces"@example.com>

    Specify "info_log_address_format = internal" for backwards compatibility.

  * Postfix now normalizes IP addresses received with XCLIENT,
    XFORWARD, or with the HaProxy protocol, for consistency with
    direct connections to Postfix. This may change the appearance
    of logging, and the way that check_client_access will match
    subnets of an IPv6 address.


3.5.1 (2020-04-20)

Postfix versions 3.5.1, 3.4.11, 3.3.9, 3.2.14:

  * Bitrot workaround for broken builds after an incompatible change
    in GCC 10.

  * Bitrot workaround for broken DANE/DNSSEC support after an
    incompatible change in GLIBC 2.31. This change avoids the need
    for new options in /etc/resolv.conf.

diffstat:

 mail/postfix-ldap/Makefile                       |   3 +-
 mail/postfix-sqlite/Makefile                     |   3 +-
 mail/postfix/Makefile                            |   3 +-
 mail/postfix/Makefile.common                     |   4 +-
 mail/postfix/distinfo                            |  12 +++++-----
 mail/postfix/patches/patch-src_dns_dns__lookup.c |  27 ++++++++++++++++--------
 6 files changed, 29 insertions(+), 23 deletions(-)

diffs (161 lines):

diff -r ec6ab59dbd94 -r 86a179a8bd64 mail/postfix-ldap/Makefile
--- a/mail/postfix-ldap/Makefile        Sun Apr 26 09:19:10 2020 +0000
+++ b/mail/postfix-ldap/Makefile        Sun Apr 26 09:33:25 2020 +0000
@@ -1,8 +1,7 @@
-# $NetBSD: Makefile,v 1.6 2020/01/18 21:49:53 jperkin Exp $
+# $NetBSD: Makefile,v 1.7 2020/04/26 09:33:26 taca Exp $
 #
 
 COMMENT=               Postfix SMTP server LDAP backend module
-PKGREVISION=           1
 
 POSTFIX_LIB=           ldap
 POSTFIX_LIBDIR=                src/global
diff -r ec6ab59dbd94 -r 86a179a8bd64 mail/postfix-sqlite/Makefile
--- a/mail/postfix-sqlite/Makefile      Sun Apr 26 09:19:10 2020 +0000
+++ b/mail/postfix-sqlite/Makefile      Sun Apr 26 09:33:25 2020 +0000
@@ -1,8 +1,7 @@
-# $NetBSD: Makefile,v 1.22 2020/04/12 08:28:56 adam Exp $
+# $NetBSD: Makefile,v 1.23 2020/04/26 09:33:26 taca Exp $
 #
 
 COMMENT=               Postfix SMTP server SQLite backend module
-PKGREVISION=           1
 
 POSTFIX_LIB=           sqlite
 POSTFIX_LIBDIR=                src/global
diff -r ec6ab59dbd94 -r 86a179a8bd64 mail/postfix/Makefile
--- a/mail/postfix/Makefile     Sun Apr 26 09:19:10 2020 +0000
+++ b/mail/postfix/Makefile     Sun Apr 26 09:33:25 2020 +0000
@@ -1,6 +1,5 @@
-# $NetBSD: Makefile,v 1.318 2020/04/12 08:28:56 adam Exp $
+# $NetBSD: Makefile,v 1.319 2020/04/26 09:33:25 taca Exp $
 
-PKGREVISION= 1
 .include "../../mail/postfix/Makefile.common"
 
 COMMENT=       Fast, easy to administer, and secure mail transfer agent
diff -r ec6ab59dbd94 -r 86a179a8bd64 mail/postfix/Makefile.common
--- a/mail/postfix/Makefile.common      Sun Apr 26 09:19:10 2020 +0000
+++ b/mail/postfix/Makefile.common      Sun Apr 26 09:33:25 2020 +0000
@@ -1,8 +1,8 @@
-# $NetBSD: Makefile.common,v 1.24 2020/02/11 20:40:27 triaxx Exp $
+# $NetBSD: Makefile.common,v 1.25 2020/04/26 09:33:25 taca Exp $
 # used by mail/postfix/Makefile
 # used by mail/postfix/Makefile.module
 
-DISTNAME=      postfix-3.4.9
+DISTNAME=      postfix-3.5.1
 CATEGORIES=    mail
 MASTER_SITES=  ftp://ftp.porcupine.org/mirrors/postfix-release/official/
 MASTER_SITES+= http://mirrors.isc.org/pub/postfix/official/
diff -r ec6ab59dbd94 -r 86a179a8bd64 mail/postfix/distinfo
--- a/mail/postfix/distinfo     Sun Apr 26 09:19:10 2020 +0000
+++ b/mail/postfix/distinfo     Sun Apr 26 09:33:25 2020 +0000
@@ -1,10 +1,10 @@
-$NetBSD: distinfo,v 1.183 2020/02/11 20:40:27 triaxx Exp $
+$NetBSD: distinfo,v 1.184 2020/04/26 09:33:25 taca Exp $
 
-SHA1 (postfix-3.4.9.tar.gz) = e2ce620f172052bb3a51e99eefe0294199163a54
-RMD160 (postfix-3.4.9.tar.gz) = 45c52a186bbadfa9ab289694b8d696565a7f39b3
-SHA512 (postfix-3.4.9.tar.gz) = 9038850d79bf19460d55dede2dd97e6f4bd8255363b4004704e5f0493bf9b1c0729f5bb11663ba6f6ed34177205609f72401b0f55d1d9dbce5398b4603a0a991
-Size (postfix-3.4.9.tar.gz) = 4573241 bytes
+SHA1 (postfix-3.5.1.tar.gz) = 2a18e312772ae322aa84cf2a16cd206ee85b0480
+RMD160 (postfix-3.5.1.tar.gz) = 43cd8af5a581054135fda54d4299ad3e6e4f611b
+SHA512 (postfix-3.5.1.tar.gz) = 9c091cda6c2d54fefc7093736f69dc60dc4d9d2d858260bde1430427bc49caa59f81aea7a992b9764998a4edaaa015ddd50392b8f0a1bccd15f52b563887a698
+Size (postfix-3.5.1.tar.gz) = 4609587 bytes
 SHA1 (patch-aa) = c8216f133e202a7bb37682b0dbc1448f021e7c1c
 SHA1 (patch-ag) = c126c572e36bf2bcbd3f6e5d8332a3d26e704109
 SHA1 (patch-ai) = 51748ccf92da543f7ff640f36906a29b5db3f6e3
-SHA1 (patch-src_dns_dns__lookup.c) = 448fe38a38cb201cd09fbae35d6c5f6cdf7df8b9
+SHA1 (patch-src_dns_dns__lookup.c) = 036872a0e6e438d0253469ea447c0c9c1de0188d
diff -r ec6ab59dbd94 -r 86a179a8bd64 mail/postfix/patches/patch-src_dns_dns__lookup.c
--- a/mail/postfix/patches/patch-src_dns_dns__lookup.c  Sun Apr 26 09:19:10 2020 +0000
+++ b/mail/postfix/patches/patch-src_dns_dns__lookup.c  Sun Apr 26 09:33:25 2020 +0000
@@ -1,10 +1,10 @@
-$NetBSD: patch-src_dns_dns__lookup.c,v 1.6 2020/02/11 20:40:27 triaxx Exp $
+$NetBSD: patch-src_dns_dns__lookup.c,v 1.7 2020/04/26 09:33:26 taca Exp $
 
 Fix runtime problem when mysql PKG_OPTIONS is enabled.
 
---- src/dns/dns_lookup.c.orig  2019-12-15 16:13:04.000000000 +0000
+--- src/dns/dns_lookup.c.orig  2019-12-15 16:19:34.000000000 +0000
 +++ src/dns/dns_lookup.c
-@@ -245,6 +245,8 @@
+@@ -247,6 +247,8 @@
  
  /* Local stuff. */
  
@@ -13,7 +13,7 @@
   /*
    * Structure to keep track of things while decoding a name server reply.
    */
-@@ -308,7 +310,7 @@ typedef struct DNS_REPLY {
+@@ -311,7 +313,7 @@ typedef struct DNS_REPLY {
  
  /* dns_res_query - a res_query() clone that can return negative replies */
  
@@ -22,7 +22,7 @@
                                 unsigned char *answer, int anslen)
  {
      unsigned char msg_buf[MAX_DNS_QUERY_SIZE];
-@@ -337,14 +339,14 @@ static int dns_res_query(const char *nam
+@@ -340,14 +342,14 @@ static int dns_res_query(const char *nam
  #define NO_MKQUERY_DATA_LEN     ((int) 0)
  #define NO_MKQUERY_NEWRR        ((unsigned char *) 0)
  
@@ -39,7 +39,7 @@
        SET_H_ERRNO(TRY_AGAIN);
        if (msg_verbose)
            msg_info("res_send() failed");
-@@ -373,7 +375,7 @@ static int dns_res_query(const char *nam
+@@ -378,7 +380,7 @@ static int dns_res_query(const char *nam
  
  /* dns_res_search - res_search() that can return negative replies */
  
@@ -48,7 +48,7 @@
                       unsigned char *answer, int anslen, int keep_notfound)
  {
      int     len;
-@@ -396,7 +398,7 @@ static int dns_res_search(const char *na
+@@ -401,7 +403,7 @@ static int dns_res_search(const char *na
      if (keep_notfound)
        /* Prepare for returning a null-padded server reply. */
        memset(answer, 0, anslen);
@@ -57,7 +57,7 @@
      /* Begin API creep workaround. */
      if (len < 0 && h_errno == 0) {
        SET_H_ERRNO(TRY_AGAIN);
-@@ -435,7 +437,7 @@ static int dns_query(const char *name, i
+@@ -440,7 +442,7 @@ static int dns_query(const char *name, i
      /*
       * Initialize the name service.
       */
@@ -66,7 +66,7 @@
        if (why)
            vstring_strcpy(why, "Name service initialization failure");
        return (DNS_FAIL);
-@@ -464,24 +466,24 @@ static int dns_query(const char *name, i
+@@ -479,32 +481,32 @@ static int dns_query(const char *name, i
       */
  #define SAVE_FLAGS (USER_FLAGS | XTRA_FLAGS)
  
@@ -83,9 +83,18 @@
 +      rstate.options &= ~saved_options;
 +      rstate.options |= flags;
        if (keep_notfound && var_dns_ncache_ttl_fix) {
+ #ifdef HAVE_RES_SEND
 -          len = dns_res_query((char *) name, C_IN, type, reply->buf,
 +              len = dns_res_query(&rstate, (char *) name, C_IN, type, reply->buf,
                                reply->buf_len);
+ #else
+           var_dns_ncache_ttl_fix = 0;
+           msg_warn("system library does not support %s=yes"
+                    " -- ignoring this setting", VAR_DNS_NCACHE_TTL_FIX);
+-          len = dns_res_search((char *) name, C_IN, type, reply->buf,
++          len = dns_res_search(&rstate, (char *) name, C_IN, type, reply->buf,
+                                reply->buf_len, keep_notfound);
+ #endif
        } else {
 -          len = dns_res_search((char *) name, C_IN, type, reply->buf,
 +              len = dns_res_search(&rstate, (char *) name, C_IN, type, reply->buf,



Home | Main Index | Thread Index | Old Index