2011-11-18 09:22:25 +00:00
|
|
|
#
|
2011-11-01 13:11:52 +00:00
|
|
|
# spec file for package request-tracker
|
|
|
|
#
|
2024-03-08 10:08:52 +00:00
|
|
|
# Copyright (c) 2024 SUSE LLC
|
2018-09-12 21:48:21 +00:00
|
|
|
# Author: Lars Vogdt
|
2011-11-01 13:11:52 +00:00
|
|
|
#
|
|
|
|
# All modifications and additions to the file contributed by third parties
|
|
|
|
# remain the property of their copyright owners, unless otherwise agreed
|
|
|
|
# upon. The license for this file, and modifications and additions to the
|
|
|
|
# file, is the same license as for the pristine package itself (unless the
|
|
|
|
# license for the pristine package is not an Open Source License, in which
|
|
|
|
# case the license is the MIT License). An "Open Source License" is a
|
|
|
|
# license that conforms to the Open Source Definition (Version 1.9)
|
|
|
|
# published by the Open Source Initiative.
|
|
|
|
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
# Please submit bugfixes or comments via https://bugs.opensuse.org/
|
2011-11-01 13:11:52 +00:00
|
|
|
#
|
|
|
|
|
2012-03-12 19:24:56 +00:00
|
|
|
|
2018-09-12 21:48:21 +00:00
|
|
|
#Compat macro for new _fillupdir macro introduced in Nov 2017
|
|
|
|
%if ! %{defined _fillupdir}
|
|
|
|
%define _fillupdir /var/adm/fillup-templates
|
|
|
|
%endif
|
|
|
|
|
|
|
|
%if 0%{?suse_version} >= 1230
|
|
|
|
%bcond_without systemd
|
|
|
|
%else
|
|
|
|
%bcond_with systemd
|
|
|
|
%endif
|
|
|
|
|
2011-11-01 13:11:52 +00:00
|
|
|
Name: request-tracker
|
|
|
|
Summary: RT: Request Tracker
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
License: GPL-2.0-or-later
|
2011-11-01 13:11:52 +00:00
|
|
|
Group: Productivity/Networking/Web/Utilities
|
2024-09-20 13:52:26 +00:00
|
|
|
Version: 5.0.7
|
2011-12-30 10:57:16 +00:00
|
|
|
Release: 0
|
2020-05-04 19:07:09 +00:00
|
|
|
URL: https://bestpractical.com/request-tracker
|
2021-10-11 10:51:01 +00:00
|
|
|
Source0: https://download.bestpractical.com/pub/rt/release/rt-%{version}.tar.gz
|
2011-11-01 13:11:52 +00:00
|
|
|
Source1: rcrequest-tracker
|
|
|
|
Source2: logrotate.%{name}
|
|
|
|
Source3: suse.de-request-tracker.cron.daily
|
|
|
|
Source4: suse.de-request-tracker.cron.weekly
|
|
|
|
Source5: suse.de-request-tracker.cron.hourly
|
|
|
|
Source6: sysconfig.%{name}
|
|
|
|
Source7: apache2-fastcgi.conf
|
|
|
|
Source8: apache2-modperl2.conf
|
|
|
|
Source9: rt-clean-mason-cache
|
|
|
|
Source10: request-tracker-rpmlintrc
|
|
|
|
Source11: rt-mysql2pg
|
2017-01-09 12:53:56 +00:00
|
|
|
Source12: README.SUSE
|
2017-05-10 20:31:26 +00:00
|
|
|
Source13: rt-ldapimport.man
|
|
|
|
Source14: rt-clean-mason-cache.man
|
|
|
|
Source15: rt-mysql2pg-contrib.man
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
Source16: request-tracker-prepare.sh
|
|
|
|
Source17: request-tracker.service
|
- update to 5.0.1:
Database Changes
+ For MySQL and MariaDB, the default character set has been updated to
utf8mb4 to accommodate more unicode characters including emojis.
See README.MySQL and README.MariaDB for details.
+ The Id field in some tables is changed from INT to BIGINT to accommodate
large RT systems that may hit the maximum number of ids. Because this
change touches large RT tables like Transactions and Attachments,
this upgrade step may take a while to run.
+ You also will need free disk space equal to the size of these tables
while running because MySQL, MariaDB, and Postgres will create a temporary
copy of the table while running. If you don't have sufficient space,
it can cause this step to fail.
Notable Changes
+ System configuration options can now be changed by SuperUsers via the
web UI. File-based configuration options are still loaded. Changes made
via the web UI take precedence over file-based options if both are set.
+ If you prefer to keep all configuration in files and disable editing in
the web UI, set this option to 0:
Set($ShowEditSystemConfig, 0);
+ The variables which alter the set of HTML elements allowed in HTML
scrubbing have moved; they have been renamed, and are now found under
RT::Interface::Web::Scrubber.
+ The articles interface on tickets has been simplified, now showing only
a dropdown for selecting articles. This dropdown converts to an autocomplete
box when the dropdown contains more than $DropdownMenuLimit items.
+ With this simplified interface, the "hotlist" feature is no longer
needed as all articles in classes applied to a given queue are available
in the dropdown/autocomplete field. To prevent articles in a class from
appearing for a queue, you can unapply the class from that queue.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=67
2021-04-13 16:33:18 +00:00
|
|
|
Source18: README.S3
|
|
|
|
Source19: README.Dropbox
|
2025-08-12 18:18:45 +02:00
|
|
|
Source100: README.md
|
2017-05-10 20:31:26 +00:00
|
|
|
Patch0: enable-build-as-non-root.patch
|
2024-03-08 10:08:52 +00:00
|
|
|
Patch1: request-tracker-use_local_lib.patch
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildArch: noarch
|
|
|
|
AutoReqProv: off
|
2024-03-08 10:08:52 +00:00
|
|
|
PreReq: %fillup_prereq
|
2011-11-01 13:11:52 +00:00
|
|
|
PreReq: apache2
|
|
|
|
PreReq: apache2-mod_perl
|
|
|
|
PreReq: postfix
|
2024-03-08 10:08:52 +00:00
|
|
|
PreReq: pwdutils
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%if %{with systemd}
|
|
|
|
BuildRequires: systemd
|
|
|
|
%{?systemd_requires}
|
|
|
|
%else
|
2024-03-08 10:08:52 +00:00
|
|
|
PreReq: %insserv_prereq
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%endif
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: perl-macros
|
|
|
|
%{perl_requires}
|
|
|
|
Provides: perl(RT) = %{version}
|
|
|
|
#Requires: droid-fonts
|
|
|
|
Requires: %{name}-db-backend == %{version}
|
2012-03-12 19:24:56 +00:00
|
|
|
Requires: logrotate
|
2011-11-01 13:11:52 +00:00
|
|
|
Recommends: %{name}-db-mysql == %{version}
|
|
|
|
# requirements from http://wiki.bestpractical.com/view/ManualRequirements
|
2012-03-12 19:24:56 +00:00
|
|
|
Requires: %{name}-mailgate = %{version}
|
2014-11-29 10:16:45 +00:00
|
|
|
#Requires: apache2-mod_fcgid
|
|
|
|
Requires: apache2-mod_perl
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl-base
|
|
|
|
# same list as in BuildRequires below:
|
|
|
|
Requires: gpg2
|
2021-04-20 08:11:34 +00:00
|
|
|
Requires: perl(Apache::DBI)
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(Apache::Session) >= 1.53
|
|
|
|
Requires: perl(CGI) >= 3.38
|
|
|
|
Requires: perl(CGI::Cookie) >= 0.76
|
|
|
|
Requires: perl(CGI::Emulate::PSGI)
|
|
|
|
Requires: perl(CGI::Fast)
|
|
|
|
Requires: perl(CGI::PSGI)
|
2017-05-17 15:00:31 +00:00
|
|
|
Requires: perl(CSS::Minifier::XS)
|
2012-03-12 19:24:56 +00:00
|
|
|
Requires: perl(CSS::Squish) >= 0.06
|
|
|
|
Requires: perl(Cache::Simple::TimedExpiry)
|
|
|
|
Requires: perl(Calendar::Simple)
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(Class::Accessor) >= 0.34
|
|
|
|
Requires: perl(Class::Accessor::Chained)
|
|
|
|
Requires: perl(Class::ReturnValue) >= 0.40
|
|
|
|
Requires: perl(Convert::Color)
|
2013-10-04 17:10:49 +00:00
|
|
|
Requires: perl(Crypt::Eksblowfish)
|
|
|
|
Requires: perl(Crypt::SSLeay)
|
|
|
|
Requires: perl(Crypt::X509)
|
|
|
|
Requires: perl(DBD::SQLite)
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(DBI) >= 1.37
|
2024-09-20 13:52:49 +00:00
|
|
|
Requires: perl(DBIx::SearchBuilder) >= 1.76
|
2013-10-04 17:10:49 +00:00
|
|
|
Requires: perl(Data::GUID)
|
2012-03-12 19:24:56 +00:00
|
|
|
Requires: perl(Data::ICal)
|
2015-03-30 15:12:49 +00:00
|
|
|
Requires: perl(Data::UUID) >= 1.148
|
2024-09-20 13:52:49 +00:00
|
|
|
Requires: perl(Date::Extract) >= 0.07
|
2013-10-04 17:10:49 +00:00
|
|
|
Requires: perl(Date::Manip)
|
|
|
|
Requires: perl(DateTime::Format::Natural)
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(Devel::StackTrace) >= 1.19
|
|
|
|
Requires: perl(Digest::MD5) >= 2.27
|
2012-03-12 19:24:56 +00:00
|
|
|
Requires: perl(Digest::base)
|
2013-10-04 17:10:49 +00:00
|
|
|
Requires: perl(Email::Address) >= 1.897
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
Requires: perl(Email::Address::List) >= 0.06
|
- update to 4.2.10
This release is primarily a security release; it addresses CVE-014-9472,
a denial-of-service via RT's email gateway, as well as CVE-2015-1165 and
CVE-2015-1464, which allow for information disclosure and session
hijacking via RT's RSS feeds.
+ General user UI
* Speed up the default simple search on all FTS-enabled installs by not
OR'ing it with a Subject match. This returns equivalent results for
almost all tickets, and allows the database to make full use of the
FTS index.
* Pressing enter in user preference form fields no longer instead
resets the auth token (#19431)
* Pressing enter in ticket create and modify form fields now creates or
updates the ticket, instead being equivalent to "add more
attachments", or the "search" on People pages (#19431)
* Properly encode headers in forwarded emails that contain non-ASCII
text (#29753)
* Allow users to customize visibility of chart/table/TicketSQL in saved
charts
* Allow groups to be added as requestors on tickets
* Perform group searches case-insensitively on People page (#27835)
* Ticket create transactions for tickets created via the web UI now
contain mocked-up From, To, and Date headers; this causes them to
render more correctly when forwarded
* Update wording of error message for saved searches without a
description (#30435)
* Flush TSV download every 10 rows, for responsiveness
* Retain values in Quick Create on homepage if it fails (#19431)
* Limit the custom field value autocomplete to 10 values, like other
autocompletes (#30190)
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=44
2015-02-26 18:16:18 +00:00
|
|
|
Requires: perl(Encode) >= 2.64
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(Errno)
|
|
|
|
Requires: perl(FCGI)
|
|
|
|
Requires: perl(FCGI::ProcManager)
|
|
|
|
Requires: perl(File::Glob)
|
|
|
|
Requires: perl(File::ShareDir)
|
|
|
|
Requires: perl(File::Spec) >= 0.8
|
|
|
|
Requires: perl(File::Temp) >= 0.19
|
|
|
|
Requires: perl(GD)
|
2024-09-20 13:52:49 +00:00
|
|
|
Requires: perl(GD::Graph) >= 1.56
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(GD::Text)
|
|
|
|
Requires: perl(GnuPG::Interface)
|
|
|
|
Requires: perl(GraphViz)
|
|
|
|
Requires: perl(HTML::Entities)
|
|
|
|
Requires: perl(HTML::FormatText)
|
2013-10-04 17:10:49 +00:00
|
|
|
Requires: perl(HTML::FormatText::WithLinks)
|
|
|
|
Requires: perl(HTML::FormatText::WithLinks::AndTables)
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(HTML::Mason) >= 1.36
|
|
|
|
Requires: perl(HTML::Mason::PSGIHandler)
|
|
|
|
Requires: perl(HTML::Quoted)
|
2013-01-17 14:31:17 +00:00
|
|
|
Requires: perl(HTML::RewriteAttributes) >= 0.05
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(HTML::Scrubber) >= 0.08
|
|
|
|
Requires: perl(HTML::TreeBuilder)
|
|
|
|
Requires: perl(HTTP::Server::Simple) >= 0.34
|
|
|
|
Requires: perl(HTTP::Server::Simple::Mason) >= 0.09
|
|
|
|
Requires: perl(IPC::Run)
|
|
|
|
Requires: perl(IPC::Run3)
|
|
|
|
Requires: perl(JSON)
|
2012-03-12 19:24:56 +00:00
|
|
|
Requires: perl(JavaScript::Minifier)
|
2017-05-17 15:00:31 +00:00
|
|
|
Requires: perl(JavaScript::Minifier::XS)
|
2012-03-12 19:24:56 +00:00
|
|
|
Requires: perl(LWP)
|
2012-09-14 18:50:18 +00:00
|
|
|
Requires: perl(LWP::Protocol::https)
|
2012-03-12 19:24:56 +00:00
|
|
|
Requires: perl(LWP::UserAgent)
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(Locale::Maketext) >= 1.06
|
|
|
|
Requires: perl(Locale::Maketext::Fuzzy)
|
|
|
|
Requires: perl(Locale::Maketext::Lexicon) >= 0.32
|
2013-10-04 17:10:49 +00:00
|
|
|
Requires: perl(Log::Dispatch) >= 2.30
|
|
|
|
Requires: perl(MIME::Entity) >= 5.504
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(MIME::Types)
|
2013-10-04 17:10:49 +00:00
|
|
|
Requires: perl(Mail::Header) >= 2.12
|
2012-03-12 19:24:56 +00:00
|
|
|
Requires: perl(Mail::Mailer) >= 1.57
|
2021-04-20 08:11:34 +00:00
|
|
|
Requires: perl(Module::Pluggable)
|
2013-10-04 17:10:49 +00:00
|
|
|
Requires: perl(Module::Refresh) >= 0.03
|
2024-09-20 13:56:30 +00:00
|
|
|
Requires: perl(Module::Runtime)
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(Module::Versions::Report) >= 1.05
|
2013-10-04 17:10:49 +00:00
|
|
|
Requires: perl(Mozilla::CA)
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(Net::CIDR)
|
|
|
|
Requires: perl(Net::SMTP)
|
2013-10-04 17:10:49 +00:00
|
|
|
Requires: perl(Net::SSL)
|
2012-03-12 19:24:56 +00:00
|
|
|
Requires: perl(Net::Server)
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(PerlIO::eol)
|
2013-10-04 17:10:49 +00:00
|
|
|
Requires: perl(Plack) >= 1.0002
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(Plack::Handler::Starlet)
|
|
|
|
Requires: perl(Pod::Usage)
|
|
|
|
Requires: perl(Regexp::Common)
|
|
|
|
Requires: perl(Regexp::Common::net::CIDR)
|
|
|
|
Requires: perl(Regexp::IPv6)
|
2013-10-04 17:10:49 +00:00
|
|
|
Requires: perl(Role::Basic)
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(Scalar::Util)
|
|
|
|
Requires: perl(Storable) >= 2.08
|
2013-10-04 17:10:49 +00:00
|
|
|
Requires: perl(String::ShellQuote)
|
|
|
|
Requires: perl(String::ShellQuote)
|
|
|
|
Requires: perl(Symbol::Global::Name) >= 0.04
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(Sys::Syslog) >= 0.16
|
|
|
|
Requires: perl(Text::Password::Pronounceable)
|
2013-10-04 17:10:49 +00:00
|
|
|
Requires: perl(Text::Quoted) >= 2.07
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(Text::Template) >= 1.44
|
|
|
|
Requires: perl(Text::WikiFormat) >= 0.76
|
|
|
|
Requires: perl(Text::Wrapper)
|
|
|
|
Requires: perl(Time::HiRes)
|
|
|
|
Requires: perl(Time::ParseDate)
|
|
|
|
Requires: perl(Tree::Simple) >= 1.04
|
|
|
|
Requires: perl(XML::RSS) >= 1.05
|
2024-03-08 10:08:52 +00:00
|
|
|
# 5.0 new CORE dependencies
|
- update to 5.0.1:
Database Changes
+ For MySQL and MariaDB, the default character set has been updated to
utf8mb4 to accommodate more unicode characters including emojis.
See README.MySQL and README.MariaDB for details.
+ The Id field in some tables is changed from INT to BIGINT to accommodate
large RT systems that may hit the maximum number of ids. Because this
change touches large RT tables like Transactions and Attachments,
this upgrade step may take a while to run.
+ You also will need free disk space equal to the size of these tables
while running because MySQL, MariaDB, and Postgres will create a temporary
copy of the table while running. If you don't have sufficient space,
it can cause this step to fail.
Notable Changes
+ System configuration options can now be changed by SuperUsers via the
web UI. File-based configuration options are still loaded. Changes made
via the web UI take precedence over file-based options if both are set.
+ If you prefer to keep all configuration in files and disable editing in
the web UI, set this option to 0:
Set($ShowEditSystemConfig, 0);
+ The variables which alter the set of HTML elements allowed in HTML
scrubbing have moved; they have been renamed, and are now found under
RT::Interface::Web::Scrubber.
+ The articles interface on tickets has been simplified, now showing only
a dropdown for selecting articles. This dropdown converts to an autocomplete
box when the dropdown contains more than $DropdownMenuLimit items.
+ With this simplified interface, the "hotlist" feature is no longer
needed as all articles in classes applied to a given queue are available
in the dropdown/autocomplete field. To prevent articles in a class from
appearing for a queue, you can unapply the class from that queue.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=67
2021-04-13 16:33:18 +00:00
|
|
|
Requires: perl(Encode::Detect::Detector)
|
|
|
|
Requires: perl(Encode::HanExtra)
|
2021-04-13 20:56:11 +00:00
|
|
|
Requires: perl(GnuPG::Interface)
|
- update to 5.0.1:
Database Changes
+ For MySQL and MariaDB, the default character set has been updated to
utf8mb4 to accommodate more unicode characters including emojis.
See README.MySQL and README.MariaDB for details.
+ The Id field in some tables is changed from INT to BIGINT to accommodate
large RT systems that may hit the maximum number of ids. Because this
change touches large RT tables like Transactions and Attachments,
this upgrade step may take a while to run.
+ You also will need free disk space equal to the size of these tables
while running because MySQL, MariaDB, and Postgres will create a temporary
copy of the table while running. If you don't have sufficient space,
it can cause this step to fail.
Notable Changes
+ System configuration options can now be changed by SuperUsers via the
web UI. File-based configuration options are still loaded. Changes made
via the web UI take precedence over file-based options if both are set.
+ If you prefer to keep all configuration in files and disable editing in
the web UI, set this option to 0:
Set($ShowEditSystemConfig, 0);
+ The variables which alter the set of HTML elements allowed in HTML
scrubbing have moved; they have been renamed, and are now found under
RT::Interface::Web::Scrubber.
+ The articles interface on tickets has been simplified, now showing only
a dropdown for selecting articles. This dropdown converts to an autocomplete
box when the dropdown contains more than $DropdownMenuLimit items.
+ With this simplified interface, the "hotlist" feature is no longer
needed as all articles in classes applied to a given queue are available
in the dropdown/autocomplete field. To prevent articles in a class from
appearing for a queue, you can unapply the class from that queue.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=67
2021-04-13 16:33:18 +00:00
|
|
|
Requires: perl(HTML::FormatExternal)
|
|
|
|
Requires: perl(HTML::Gumbo)
|
|
|
|
Requires: perl(Module::Path)
|
|
|
|
Requires: perl(Moose)
|
|
|
|
Requires: perl(MooseX::NonMoose)
|
|
|
|
Requires: perl(MooseX::Role::Parameterized)
|
2021-10-11 10:51:01 +00:00
|
|
|
Requires: perl(Parallel::ForkManager)
|
- update to 5.0.1:
Database Changes
+ For MySQL and MariaDB, the default character set has been updated to
utf8mb4 to accommodate more unicode characters including emojis.
See README.MySQL and README.MariaDB for details.
+ The Id field in some tables is changed from INT to BIGINT to accommodate
large RT systems that may hit the maximum number of ids. Because this
change touches large RT tables like Transactions and Attachments,
this upgrade step may take a while to run.
+ You also will need free disk space equal to the size of these tables
while running because MySQL, MariaDB, and Postgres will create a temporary
copy of the table while running. If you don't have sufficient space,
it can cause this step to fail.
Notable Changes
+ System configuration options can now be changed by SuperUsers via the
web UI. File-based configuration options are still loaded. Changes made
via the web UI take precedence over file-based options if both are set.
+ If you prefer to keep all configuration in files and disable editing in
the web UI, set this option to 0:
Set($ShowEditSystemConfig, 0);
+ The variables which alter the set of HTML elements allowed in HTML
scrubbing have moved; they have been renamed, and are now found under
RT::Interface::Web::Scrubber.
+ The articles interface on tickets has been simplified, now showing only
a dropdown for selecting articles. This dropdown converts to an autocomplete
box when the dropdown contains more than $DropdownMenuLimit items.
+ With this simplified interface, the "hotlist" feature is no longer
needed as all articles in classes applied to a given queue are available
in the dropdown/autocomplete field. To prevent articles in a class from
appearing for a queue, you can unapply the class from that queue.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=67
2021-04-13 16:33:18 +00:00
|
|
|
Requires: perl(Path::Dispatcher) >= 1.07
|
|
|
|
Requires: perl(Text::WordDiff)
|
|
|
|
Requires: perl(Web::Machine) >= 0.12
|
|
|
|
# 5.0 EXTERNALAUTH dependencies
|
|
|
|
Requires: perl(Net::LDAP)
|
|
|
|
# 5.0 end dependencies
|
2019-03-14 14:46:56 +00:00
|
|
|
Recommends: perl(HTML::Gumbo) >= 0.18
|
2019-03-14 14:53:28 +00:00
|
|
|
Recommends: perl(HTML::FormatExternal)
|
2018-09-12 21:48:21 +00:00
|
|
|
%if %{with systemd}
|
|
|
|
BuildRequires: systemd
|
|
|
|
%{?systemd_requires}
|
2020-05-04 19:07:09 +00:00
|
|
|
%else
|
|
|
|
Requires: cron
|
|
|
|
BuildRequires: cron
|
2018-09-12 21:48:21 +00:00
|
|
|
%endif
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: apache2-devel
|
|
|
|
BuildRequires: fdupes
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: gd-devel
|
|
|
|
BuildRequires: gpg2
|
2011-11-01 13:11:52 +00:00
|
|
|
# 4.0.1
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(CGI::Emulate::PSGI)
|
|
|
|
BuildRequires: perl(CGI::PSGI)
|
|
|
|
BuildRequires: perl(Convert::Color)
|
2015-03-30 15:12:49 +00:00
|
|
|
BuildRequires: perl(Data::UUID) >= 1.148
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: perl(FCGI::ProcManager)
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(GraphViz)
|
|
|
|
BuildRequires: perl(HTML::Mason::PSGIHandler)
|
|
|
|
BuildRequires: perl(HTML::Quoted)
|
|
|
|
BuildRequires: perl(IPC::Run)
|
|
|
|
BuildRequires: perl(IPC::Run3)
|
|
|
|
BuildRequires: perl(JSON)
|
|
|
|
BuildRequires: perl(JavaScript::Minifier)
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: perl(Net::CIDR)
|
2013-10-04 17:10:49 +00:00
|
|
|
BuildRequires: perl(Plack) >= 1.0002
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(Plack::Handler::Starlet)
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: perl(Regexp::Common::net::CIDR)
|
|
|
|
BuildRequires: perl(Regexp::IPv6)
|
|
|
|
BuildRequires: perl(Text::Password::Pronounceable)
|
2017-05-10 20:31:26 +00:00
|
|
|
# 4.4.1
|
|
|
|
BuildRequires: perl(Business::Hours)
|
|
|
|
BuildRequires: perl(CSS::Minifier::XS)
|
|
|
|
BuildRequires: perl(JavaScript::Minifier::XS)
|
|
|
|
BuildRequires: perl(Net::IP)
|
|
|
|
BuildRequires: perl(Scope::Upper)
|
2011-11-01 13:11:52 +00:00
|
|
|
# CLI dependencies
|
|
|
|
BuildRequires: perl(Getopt::Long)
|
|
|
|
BuildRequires: perl(HTTP::Request::Common)
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(LWP)
|
2012-09-14 18:50:18 +00:00
|
|
|
BuildRequires: perl(LWP::Protocol::https)
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(Term::ReadKey)
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: perl(Term::ReadLine)
|
|
|
|
BuildRequires: perl(Text::ParseWords)
|
|
|
|
# CORE dependencies
|
|
|
|
BuildRequires: perl(Apache::DBI)
|
|
|
|
BuildRequires: perl(CSS::Squish) >= 0.06
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(Cache::Simple::TimedExpiry)
|
|
|
|
BuildRequires: perl(Calendar::Simple)
|
|
|
|
BuildRequires: perl(Class::ReturnValue) >= 0.40
|
2013-10-04 17:10:49 +00:00
|
|
|
BuildRequires: perl(Crypt::Eksblowfish)
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: perl(DBI) >= 1.37
|
2013-10-04 17:10:49 +00:00
|
|
|
BuildRequires: perl(DBIx::SearchBuilder) >= 1.65
|
|
|
|
BuildRequires: perl(Data::GUID)
|
2024-09-20 13:59:57 +00:00
|
|
|
BuildRequires: perl(Data::Page)
|
2013-10-04 17:10:49 +00:00
|
|
|
BuildRequires: perl(Date::Extract)
|
|
|
|
BuildRequires: perl(Date::Manip)
|
|
|
|
BuildRequires: perl(DateTime::Format::Natural)
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: perl(Devel::StackTrace) >= 1.19
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(Digest::MD5) >= 2.27
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: perl(Digest::base)
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
BuildRequires: perl(Email::Address::List) >= 0.06
|
- update to 4.2.10
This release is primarily a security release; it addresses CVE-014-9472,
a denial-of-service via RT's email gateway, as well as CVE-2015-1165 and
CVE-2015-1464, which allow for information disclosure and session
hijacking via RT's RSS feeds.
+ General user UI
* Speed up the default simple search on all FTS-enabled installs by not
OR'ing it with a Subject match. This returns equivalent results for
almost all tickets, and allows the database to make full use of the
FTS index.
* Pressing enter in user preference form fields no longer instead
resets the auth token (#19431)
* Pressing enter in ticket create and modify form fields now creates or
updates the ticket, instead being equivalent to "add more
attachments", or the "search" on People pages (#19431)
* Properly encode headers in forwarded emails that contain non-ASCII
text (#29753)
* Allow users to customize visibility of chart/table/TicketSQL in saved
charts
* Allow groups to be added as requestors on tickets
* Perform group searches case-insensitively on People page (#27835)
* Ticket create transactions for tickets created via the web UI now
contain mocked-up From, To, and Date headers; this causes them to
render more correctly when forwarded
* Update wording of error message for saved searches without a
description (#30435)
* Flush TSV download every 10 rows, for responsiveness
* Retain values in Quick Create on homepage if it fails (#19431)
* Limit the custom field value autocomplete to 10 values, like other
autocompletes (#30190)
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=44
2015-02-26 18:16:18 +00:00
|
|
|
BuildRequires: perl(Encode) >= 2.64
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(File::Glob)
|
|
|
|
BuildRequires: perl(File::ShareDir)
|
|
|
|
BuildRequires: perl(File::Spec) >= 0.8
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: perl(File::Temp) >= 0.19
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(HTML::Entities)
|
2013-10-04 17:10:49 +00:00
|
|
|
BuildRequires: perl(HTML::FormatText::WithLinks)
|
|
|
|
BuildRequires: perl(HTML::FormatText::WithLinks::AndTables)
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: perl(HTML::Scrubber) >= 0.08
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(Locale::Maketext) >= 1.06
|
|
|
|
BuildRequires: perl(Locale::Maketext::Fuzzy)
|
|
|
|
BuildRequires: perl(Locale::Maketext::Lexicon) >= 0.32
|
2013-10-04 17:10:49 +00:00
|
|
|
BuildRequires: perl(Log::Dispatch) >= 2.30
|
|
|
|
BuildRequires: perl(MIME::Entity) >= 5.504
|
|
|
|
BuildRequires: perl(Mail::Header) >= 2.12
|
2011-11-18 09:22:25 +00:00
|
|
|
BuildRequires: perl(Mail::Mailer) >= 1.57
|
2017-05-10 20:31:26 +00:00
|
|
|
BuildRequires: perl(Module::Pluggable)
|
2013-10-04 17:10:49 +00:00
|
|
|
BuildRequires: perl(Module::Refresh) >= 0.03
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(Module::Versions::Report) >= 1.05
|
2021-10-11 10:51:01 +00:00
|
|
|
BuildRequires: perl(Parallel::ForkManager)
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: perl(Regexp::Common)
|
2013-10-04 17:10:49 +00:00
|
|
|
BuildRequires: perl(Role::Basic)
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(Scalar::Util)
|
2013-10-04 17:10:49 +00:00
|
|
|
BuildRequires: perl(Symbol::Global::Name) >= 0.04
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(Sys::Syslog) >= 0.16
|
2013-10-04 17:10:49 +00:00
|
|
|
BuildRequires: perl(Text::Quoted) >= 2.07
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(Text::Template) >= 1.44
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: perl(Text::Wrapper)
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(Time::HiRes)
|
|
|
|
BuildRequires: perl(Time::ParseDate)
|
|
|
|
BuildRequires: perl(Tree::Simple) >= 1.04
|
2021-04-20 08:11:34 +00:00
|
|
|
# 4.4.1
|
|
|
|
Requires: perl(Business::Hours)
|
|
|
|
Requires: perl(CSS::Minifier::XS)
|
2024-09-20 13:59:57 +00:00
|
|
|
Requires: perl(Data::Page)
|
2021-04-20 08:11:34 +00:00
|
|
|
Requires: perl(JavaScript::Minifier::XS)
|
|
|
|
Requires: perl(Net::IP)
|
|
|
|
Requires: perl(Scope::Upper)
|
2024-03-08 10:08:52 +00:00
|
|
|
# 5.0 new CORE dependencies
|
- update to 5.0.1:
Database Changes
+ For MySQL and MariaDB, the default character set has been updated to
utf8mb4 to accommodate more unicode characters including emojis.
See README.MySQL and README.MariaDB for details.
+ The Id field in some tables is changed from INT to BIGINT to accommodate
large RT systems that may hit the maximum number of ids. Because this
change touches large RT tables like Transactions and Attachments,
this upgrade step may take a while to run.
+ You also will need free disk space equal to the size of these tables
while running because MySQL, MariaDB, and Postgres will create a temporary
copy of the table while running. If you don't have sufficient space,
it can cause this step to fail.
Notable Changes
+ System configuration options can now be changed by SuperUsers via the
web UI. File-based configuration options are still loaded. Changes made
via the web UI take precedence over file-based options if both are set.
+ If you prefer to keep all configuration in files and disable editing in
the web UI, set this option to 0:
Set($ShowEditSystemConfig, 0);
+ The variables which alter the set of HTML elements allowed in HTML
scrubbing have moved; they have been renamed, and are now found under
RT::Interface::Web::Scrubber.
+ The articles interface on tickets has been simplified, now showing only
a dropdown for selecting articles. This dropdown converts to an autocomplete
box when the dropdown contains more than $DropdownMenuLimit items.
+ With this simplified interface, the "hotlist" feature is no longer
needed as all articles in classes applied to a given queue are available
in the dropdown/autocomplete field. To prevent articles in a class from
appearing for a queue, you can unapply the class from that queue.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=67
2021-04-13 16:33:18 +00:00
|
|
|
BuildRequires: perl(Encode::Detect::Detector)
|
|
|
|
BuildRequires: perl(Encode::HanExtra)
|
2021-04-13 20:56:11 +00:00
|
|
|
BuildRequires: perl(GnuPG::Interface)
|
- update to 5.0.1:
Database Changes
+ For MySQL and MariaDB, the default character set has been updated to
utf8mb4 to accommodate more unicode characters including emojis.
See README.MySQL and README.MariaDB for details.
+ The Id field in some tables is changed from INT to BIGINT to accommodate
large RT systems that may hit the maximum number of ids. Because this
change touches large RT tables like Transactions and Attachments,
this upgrade step may take a while to run.
+ You also will need free disk space equal to the size of these tables
while running because MySQL, MariaDB, and Postgres will create a temporary
copy of the table while running. If you don't have sufficient space,
it can cause this step to fail.
Notable Changes
+ System configuration options can now be changed by SuperUsers via the
web UI. File-based configuration options are still loaded. Changes made
via the web UI take precedence over file-based options if both are set.
+ If you prefer to keep all configuration in files and disable editing in
the web UI, set this option to 0:
Set($ShowEditSystemConfig, 0);
+ The variables which alter the set of HTML elements allowed in HTML
scrubbing have moved; they have been renamed, and are now found under
RT::Interface::Web::Scrubber.
+ The articles interface on tickets has been simplified, now showing only
a dropdown for selecting articles. This dropdown converts to an autocomplete
box when the dropdown contains more than $DropdownMenuLimit items.
+ With this simplified interface, the "hotlist" feature is no longer
needed as all articles in classes applied to a given queue are available
in the dropdown/autocomplete field. To prevent articles in a class from
appearing for a queue, you can unapply the class from that queue.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=67
2021-04-13 16:33:18 +00:00
|
|
|
BuildRequires: perl(HTML::FormatExternal)
|
|
|
|
BuildRequires: perl(HTML::Gumbo)
|
|
|
|
BuildRequires: perl(Module::Path)
|
|
|
|
BuildRequires: perl(Moose)
|
|
|
|
BuildRequires: perl(MooseX::NonMoose)
|
|
|
|
BuildRequires: perl(MooseX::Role::Parameterized)
|
|
|
|
BuildRequires: perl(Path::Dispatcher) >= 1.07
|
|
|
|
BuildRequires: perl(Text::WordDiff)
|
|
|
|
BuildRequires: perl(Web::Machine) >= 0.12
|
|
|
|
# 5.0 EXTERNALAUTH dependencies
|
|
|
|
BuildRequires: perl(Net::LDAP)
|
|
|
|
# 5.0 end dependencies
|
2024-09-20 13:52:26 +00:00
|
|
|
# 5.0.7 dependencies
|
|
|
|
BuildRequires: perl(GraphViz2)
|
|
|
|
Requires: perl(GraphViz2)
|
|
|
|
# End 5.0.7 dependencies
|
2013-10-04 17:10:49 +00:00
|
|
|
BuildRequires: perl(Email::Address) >= 1.897
|
2024-09-20 13:56:30 +00:00
|
|
|
BuildRequires: perl(Module::Runtime)
|
2011-11-01 13:11:52 +00:00
|
|
|
# DASHBOARDS dependencies
|
|
|
|
BuildRequires: perl(HTML::RewriteAttributes) >= 0.4
|
|
|
|
BuildRequires: perl(MIME::Types)
|
|
|
|
# FASTCGI dependencies
|
|
|
|
BuildRequires: perl(CGI::Fast)
|
|
|
|
# some other package provides perl(CGI), but we really need the correct package
|
|
|
|
BuildRequires: perl(CGI) >= 3.38
|
2021-04-20 08:11:34 +00:00
|
|
|
Requires: perl(CGI) >= 3.38
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: perl(FCGI)
|
2021-04-20 08:11:34 +00:00
|
|
|
Requires: perl(FCGI)
|
2011-11-01 13:11:52 +00:00
|
|
|
# GD dependencies
|
|
|
|
BuildRequires: perl(GD)
|
2024-09-20 13:52:49 +00:00
|
|
|
BuildRequires: perl(GD::Graph) >= 1.56
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(GD::Text)
|
2011-11-01 13:11:52 +00:00
|
|
|
# GPG dependencies
|
|
|
|
BuildRequires: perl(GnuPG::Interface)
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(PerlIO::eol)
|
2011-11-01 13:11:52 +00:00
|
|
|
# ICAL dependencies
|
2021-04-20 08:11:34 +00:00
|
|
|
BuildRequires: perl(Class::Accessor) >= 0.34
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(Data::ICal)
|
2011-11-01 13:11:52 +00:00
|
|
|
#>= 0.34
|
|
|
|
BuildRequires: perl(Class::Accessor::Chained)
|
|
|
|
# MAILGATE dependencies
|
2013-10-04 17:10:49 +00:00
|
|
|
BuildRequires: perl(Crypt::SSLeay)
|
2021-04-20 08:11:34 +00:00
|
|
|
BuildRequires: perl(HTML::FormatText)
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: perl(HTML::TreeBuilder)
|
2021-04-20 08:11:34 +00:00
|
|
|
BuildRequires: perl(LWP::UserAgent)
|
2013-10-04 17:10:49 +00:00
|
|
|
BuildRequires: perl(Mozilla::CA)
|
|
|
|
BuildRequires: perl(Net::SSL)
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(Pod::Usage)
|
2011-11-01 13:11:52 +00:00
|
|
|
# MASON dependencies
|
|
|
|
BuildRequires: perl(Storable) >= 2.08
|
|
|
|
#BuildRequires: perl-CSS-Squish >= 0.06 # duplicate
|
|
|
|
BuildRequires: perl(Apache::Session) >= 1.53
|
|
|
|
BuildRequires: perl(Errno)
|
|
|
|
#BuildRequires: perl(Devel::StackTrace) >= 1.19 # duplicate
|
|
|
|
BuildRequires: perl(CGI::Cookie) >= 0.76
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(HTML::Mason) >= 1.36
|
2011-11-01 13:11:52 +00:00
|
|
|
BuildRequires: perl(Text::WikiFormat) >= 0.76
|
|
|
|
BuildRequires: perl(XML::RSS) >= 1.05
|
|
|
|
#BuildRequires: perl(Digest::MD5) >= 2.27 # duplicate
|
|
|
|
# MYSQL dependencies
|
|
|
|
BuildRequires: perl(DBD::mysql) >= 2.1018
|
|
|
|
# SMTP dependencies
|
|
|
|
BuildRequires: perl(Net::SMTP)
|
|
|
|
# STANDALONE dependencies
|
|
|
|
BuildRequires: perl(HTTP::Server::Simple) >= 0.34
|
|
|
|
BuildRequires: perl(HTTP::Server::Simple::Mason) >= 0.09
|
2012-03-12 19:24:56 +00:00
|
|
|
BuildRequires: perl(Net::Server)
|
2024-03-08 10:08:52 +00:00
|
|
|
# SMIME dependencies
|
2013-10-04 17:10:49 +00:00
|
|
|
BuildRequires: perl(Crypt::X509)
|
|
|
|
BuildRequires: perl(String::ShellQuote)
|
|
|
|
# SQLite dependencies
|
2024-09-20 13:52:49 +00:00
|
|
|
BuildRequires: perl(DBD::SQLite) >= 1.72
|
2021-04-20 08:44:14 +00:00
|
|
|
# recommended packages
|
2024-03-08 10:08:52 +00:00
|
|
|
# Running with the internal HTML converter can result in performance issues with some HTML.
|
|
|
|
# Install one of the following utilities with your package manager to improve performance
|
|
|
|
# with an external tool: w3m, elinks, links, html2text, lynx
|
2021-04-20 08:44:14 +00:00
|
|
|
Recommends: w3m
|
2011-11-18 09:22:25 +00:00
|
|
|
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
2011-11-01 13:11:52 +00:00
|
|
|
|
|
|
|
%description
|
|
|
|
Request Tracker (RT) is an enterprise-grade ticketing system which enables a
|
|
|
|
group of people to intelligently and efficiently manage tasks, issues, and
|
|
|
|
requests submitted by a community of users. It features a web, email and
|
|
|
|
command-line interfaces.
|
|
|
|
|
|
|
|
Written in object-oriented Perl, RT is a high-level, portable, platform
|
|
|
|
independent system that eases collaboration within organizations and makes it
|
|
|
|
easy for them to take care of their customers.
|
|
|
|
|
|
|
|
RT manages key tasks such as the identification, prioritization, assignment,
|
|
|
|
resolution and notification required by enterprise-critical applications
|
|
|
|
including project management, help desk, NOC ticketing, CRM and software
|
|
|
|
development.
|
|
|
|
|
2024-03-08 10:08:52 +00:00
|
|
|
%define webdir %{_datadir}/%{name}
|
2011-11-01 13:11:52 +00:00
|
|
|
%define rt_libdir %{perl_vendorlib}
|
|
|
|
%define rt_wwwdir %{webdir}/html
|
|
|
|
%define rt_logdir %{_var}/log/%{name}
|
|
|
|
%define rt_cachedir %{_var}/cache/%{name}
|
2013-10-08 18:02:20 +00:00
|
|
|
%define rt_localstatedir %{_var}/lib/%{name}
|
2011-11-01 13:11:52 +00:00
|
|
|
%define rt_sbindir %{_sbindir}
|
|
|
|
%define rt_bindir %{_bindir}
|
|
|
|
%define rt_mandir %{_mandir}
|
|
|
|
%define rt_sysconfdir %{_sysconfdir}/%{name}
|
|
|
|
%define rt_user rt
|
|
|
|
%define rt_group rt
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%define www_user wwwrun
|
|
|
|
%define www_group www
|
2011-11-01 13:11:52 +00:00
|
|
|
|
|
|
|
%package mailgate
|
2011-11-18 09:22:25 +00:00
|
|
|
Summary: Mail gateway for Request Tracker
|
2011-11-01 13:11:52 +00:00
|
|
|
Group: Productivity/Networking/Web/Utilities
|
|
|
|
Requires: smtp_daemon
|
|
|
|
Requires: perl(Getopt::Long)
|
2012-03-12 19:24:56 +00:00
|
|
|
Requires: perl(HTML::FormatText)
|
|
|
|
Requires: perl(HTML::TreeBuilder)
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(HTTP::Request::Common)
|
|
|
|
Requires: perl(LWP)
|
2012-09-14 18:50:18 +00:00
|
|
|
Requires: perl(LWP::Protocol::https)
|
2011-11-01 13:11:52 +00:00
|
|
|
Requires: perl(Pod::Usage)
|
2012-03-12 19:24:56 +00:00
|
|
|
Requires: perl(Term::ReadKey)
|
|
|
|
Requires: perl(Term::ReadLine)
|
|
|
|
Requires: perl(Text::ParseWords)
|
2011-11-01 13:11:52 +00:00
|
|
|
|
|
|
|
%description mailgate
|
|
|
|
This package provides support for injecting tickets into Request Tracker
|
|
|
|
from a mail server via rt-mailgate. It may be installed onto any
|
|
|
|
machine where you want to use the mail gateway interface.
|
|
|
|
|
|
|
|
%package db-oracle
|
|
|
|
Summary: Oracle database backend for Request Tracker
|
|
|
|
Group: Productivity/Networking/Web/Utilities
|
|
|
|
Requires: perl-DBD-Oracle
|
|
|
|
|
|
|
|
%description db-oracle
|
|
|
|
This package provides dependencies and support for using Request Tracker
|
|
|
|
with an Oracle database.
|
|
|
|
|
|
|
|
%package db-postgres
|
|
|
|
Summary: PostgreSQL database backend for Request Tracker
|
|
|
|
Group: Productivity/Networking/Web/Utilities
|
|
|
|
PreReq: postgresql
|
|
|
|
Recommends: postgresql-backupscript
|
|
|
|
Requires: %{name} = %{version}
|
2012-03-12 19:24:56 +00:00
|
|
|
Requires: perl(DBD::Pg)
|
2011-11-01 13:11:52 +00:00
|
|
|
Recommends: postgresql-server
|
|
|
|
Provides: %{name}-db-backend = %{version}-%{release}
|
|
|
|
|
|
|
|
%description db-postgres
|
|
|
|
This package provides dependencies and support for using Request Tracker
|
|
|
|
with a PostgreSQL database.
|
|
|
|
|
|
|
|
%package db-mysql
|
|
|
|
Summary: MySQL database backend for Request Tracker
|
|
|
|
Group: Productivity/Networking/Web/Utilities
|
|
|
|
PreReq: mysql
|
|
|
|
Recommends: mysql-backupscript
|
|
|
|
Requires: %{name} = %{version}
|
2012-03-12 19:24:56 +00:00
|
|
|
Requires: perl(DBD::mysql) >= 2.1018
|
2011-11-01 13:11:52 +00:00
|
|
|
Recommends: mysql-community-server
|
|
|
|
Provides: %{name}-db-backend = %{version}-%{release}
|
|
|
|
|
|
|
|
%description db-mysql
|
|
|
|
This package provides dependencies and support for using Request Tracker
|
|
|
|
with a MySQL database.
|
|
|
|
|
|
|
|
%package db-sqlite
|
|
|
|
Summary: SQLite database backend for Request Tracker
|
|
|
|
Group: Productivity/Networking/Web/Utilities
|
|
|
|
PreReq: sqlite3
|
|
|
|
Requires: %{name} = %{version}
|
2012-03-12 19:24:56 +00:00
|
|
|
Requires: perl(DBD::SQLite)
|
2011-11-01 13:11:52 +00:00
|
|
|
Provides: %{name}-db-backend = %{version}-%{release}
|
|
|
|
|
|
|
|
%description db-sqlite
|
|
|
|
This package provides dependencies and support for using Request Tracker
|
|
|
|
with a SQLite database. Please note: SQLite is not recommended for production
|
|
|
|
use.
|
|
|
|
|
- update to 5.0.1:
Database Changes
+ For MySQL and MariaDB, the default character set has been updated to
utf8mb4 to accommodate more unicode characters including emojis.
See README.MySQL and README.MariaDB for details.
+ The Id field in some tables is changed from INT to BIGINT to accommodate
large RT systems that may hit the maximum number of ids. Because this
change touches large RT tables like Transactions and Attachments,
this upgrade step may take a while to run.
+ You also will need free disk space equal to the size of these tables
while running because MySQL, MariaDB, and Postgres will create a temporary
copy of the table while running. If you don't have sufficient space,
it can cause this step to fail.
Notable Changes
+ System configuration options can now be changed by SuperUsers via the
web UI. File-based configuration options are still loaded. Changes made
via the web UI take precedence over file-based options if both are set.
+ If you prefer to keep all configuration in files and disable editing in
the web UI, set this option to 0:
Set($ShowEditSystemConfig, 0);
+ The variables which alter the set of HTML elements allowed in HTML
scrubbing have moved; they have been renamed, and are now found under
RT::Interface::Web::Scrubber.
+ The articles interface on tickets has been simplified, now showing only
a dropdown for selecting articles. This dropdown converts to an autocomplete
box when the dropdown contains more than $DropdownMenuLimit items.
+ With this simplified interface, the "hotlist" feature is no longer
needed as all articles in classes applied to a given queue are available
in the dropdown/autocomplete field. To prevent articles in a class from
appearing for a queue, you can unapply the class from that queue.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=67
2021-04-13 16:33:18 +00:00
|
|
|
%package attachment-storage-S3
|
|
|
|
Summary: Amazon S3 attachment storage
|
|
|
|
Group: Productivity/Networking/Web/Utilities
|
|
|
|
Requires: perl(Amazon::S3)
|
|
|
|
Provides: RT-attachment-storage = %{version}-%{release}
|
|
|
|
|
|
|
|
%description attachment-storage-S3
|
|
|
|
This storage option places attachments in the S3 cloud file storage service.
|
|
|
|
The files are de-duplicated when they are saved; as such, if the same file
|
|
|
|
appears in multiple transactions, only one copy will be stored in S3.
|
|
|
|
|
|
|
|
Files in S3 must not be modified or removed; doing so may cause internal
|
|
|
|
inconsistency. It is also important to ensure that the S3 account used
|
|
|
|
maintains sufficient funds for your RT's storage and bandwidth needs.
|
|
|
|
|
|
|
|
%package attachment-storage-Dropbox
|
|
|
|
Summary: Dropbox attachment storage
|
|
|
|
Group: Productivity/Networking/Web/Utilities
|
|
|
|
Requires: perl(File::Dropbox) >= 0.7
|
|
|
|
Provides: RT-attachment-storage = %{version}-%{release}
|
|
|
|
|
|
|
|
%description attachment-storage-Dropbox
|
|
|
|
This storage option places attachments in the Dropbox shared file service. The
|
|
|
|
files are de-duplicated when they are saved; as such, if the same file appears
|
|
|
|
in multiple transactions, only one copy will be stored in Dropbox.
|
|
|
|
|
|
|
|
Files in Dropbox must not be modified or removed; doing so may cause internal
|
|
|
|
inconsistency. It is also important to ensure that the Dropbox account used has
|
|
|
|
sufficient space for the attachments, and to monitor its space usage.
|
|
|
|
|
2011-11-01 13:11:52 +00:00
|
|
|
%prep
|
2024-03-08 10:08:52 +00:00
|
|
|
%autosetup -n rt-%{version} -p1
|
2017-05-10 20:31:26 +00:00
|
|
|
|
- update to 5.0.1:
Database Changes
+ For MySQL and MariaDB, the default character set has been updated to
utf8mb4 to accommodate more unicode characters including emojis.
See README.MySQL and README.MariaDB for details.
+ The Id field in some tables is changed from INT to BIGINT to accommodate
large RT systems that may hit the maximum number of ids. Because this
change touches large RT tables like Transactions and Attachments,
this upgrade step may take a while to run.
+ You also will need free disk space equal to the size of these tables
while running because MySQL, MariaDB, and Postgres will create a temporary
copy of the table while running. If you don't have sufficient space,
it can cause this step to fail.
Notable Changes
+ System configuration options can now be changed by SuperUsers via the
web UI. File-based configuration options are still loaded. Changes made
via the web UI take precedence over file-based options if both are set.
+ If you prefer to keep all configuration in files and disable editing in
the web UI, set this option to 0:
Set($ShowEditSystemConfig, 0);
+ The variables which alter the set of HTML elements allowed in HTML
scrubbing have moved; they have been renamed, and are now found under
RT::Interface::Web::Scrubber.
+ The articles interface on tickets has been simplified, now showing only
a dropdown for selecting articles. This dropdown converts to an autocomplete
box when the dropdown contains more than $DropdownMenuLimit items.
+ With this simplified interface, the "hotlist" feature is no longer
needed as all articles in classes applied to a given queue are available
in the dropdown/autocomplete field. To prevent articles in a class from
appearing for a queue, you can unapply the class from that queue.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=67
2021-04-13 16:33:18 +00:00
|
|
|
# remove temporary (left over) files/dirs:
|
|
|
|
rm -rf share/static/RichText/skins/bootstrapck/.temp
|
|
|
|
|
|
|
|
# install README files
|
2017-01-09 12:53:56 +00:00
|
|
|
install -m 0644 %{S:12} README.SUSE
|
- update to 5.0.1:
Database Changes
+ For MySQL and MariaDB, the default character set has been updated to
utf8mb4 to accommodate more unicode characters including emojis.
See README.MySQL and README.MariaDB for details.
+ The Id field in some tables is changed from INT to BIGINT to accommodate
large RT systems that may hit the maximum number of ids. Because this
change touches large RT tables like Transactions and Attachments,
this upgrade step may take a while to run.
+ You also will need free disk space equal to the size of these tables
while running because MySQL, MariaDB, and Postgres will create a temporary
copy of the table while running. If you don't have sufficient space,
it can cause this step to fail.
Notable Changes
+ System configuration options can now be changed by SuperUsers via the
web UI. File-based configuration options are still loaded. Changes made
via the web UI take precedence over file-based options if both are set.
+ If you prefer to keep all configuration in files and disable editing in
the web UI, set this option to 0:
Set($ShowEditSystemConfig, 0);
+ The variables which alter the set of HTML elements allowed in HTML
scrubbing have moved; they have been renamed, and are now found under
RT::Interface::Web::Scrubber.
+ The articles interface on tickets has been simplified, now showing only
a dropdown for selecting articles. This dropdown converts to an autocomplete
box when the dropdown contains more than $DropdownMenuLimit items.
+ With this simplified interface, the "hotlist" feature is no longer
needed as all articles in classes applied to a given queue are available
in the dropdown/autocomplete field. To prevent articles in a class from
appearing for a queue, you can unapply the class from that queue.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=67
2021-04-13 16:33:18 +00:00
|
|
|
install -m 0644 %{S:18} README.S3
|
|
|
|
install -m 0644 %{S:19} README.Dropbox
|
2011-11-01 13:11:52 +00:00
|
|
|
|
|
|
|
sed -i "s|__vendorperl__|%{perl_vendorlib}|g" sbin/* bin/*
|
|
|
|
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
# prepare scripts/cron jobs for installation
|
|
|
|
for source in %{SOURCE1} %{SOURCE3} %{SOURCE4} %{SOURCE5} %{SOURCE6} %{SOURCE16} %{SOURCE17}; do
|
2011-11-01 13:11:52 +00:00
|
|
|
sed -e "s|__RT_CACHEDIR__|%{rt_cachedir}|g; \
|
|
|
|
s|__MASONSTATEDIR__|%{rt_cachedir}/mason_data|g; \
|
|
|
|
s|__SESSIONSTATEDIR__|%{rt_cachedir}/session_data|g; \
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
s|__RT_BINDIR__|%{rt_bindir}|g; \
|
|
|
|
s|__RT_SBINDIR__|%{rt_sbindir}|g; \
|
2011-11-01 13:11:52 +00:00
|
|
|
s|__RT_LOGDIR__|%{rt_logdir}|g; \
|
|
|
|
s|__RT_USER__|%{rt_user}|g; \
|
|
|
|
s|__RT_GROUP__|%{rt_group}|g; \
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
s|__WWW_USER__|%{www_user}|g; \
|
|
|
|
s|__WWW_GROUP__|%{www_group}|g; \
|
|
|
|
s|__RT_SBINDIR__|%{rt_sbindir}|g; \
|
2011-11-01 13:11:52 +00:00
|
|
|
s|__RT_LOCALSTATEDIR__|%{rt_localstatedir}|g" \
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
"$source" > $(basename "$source")
|
2011-11-01 13:11:52 +00:00
|
|
|
done
|
|
|
|
# fix documentation for the openSUSE layout
|
2024-09-20 13:52:26 +00:00
|
|
|
for file in $(find docs/ -type f) README* ; do
|
2011-11-01 13:11:52 +00:00
|
|
|
sed -i "s|/opt/rt4/sbin|%{rt_sbindir}|g; \
|
|
|
|
s|/opt/rt4/share/html|%{rt_wwwdir}|g; \
|
|
|
|
s|/opt/rt4/var|%{rt_cachedir}|g; \
|
|
|
|
s|/opt/rt4/lib|%{rt_libdir}|g; \
|
|
|
|
s|/opt/rt4/local|%{webdir}/local|g; \
|
|
|
|
s|etc/upgrade|%{webdir}/etc/upgrade|g; \
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
s|/opt/rt4/bin|%{rt_bindir}|g;" \
|
2011-11-01 13:11:52 +00:00
|
|
|
$file
|
|
|
|
done
|
|
|
|
# Propagate rpm's directories to config.layout
|
|
|
|
cat << \EOF >> config.layout
|
|
|
|
# openSUSE directory layout.
|
|
|
|
<Layout openSUSE>
|
2024-03-08 10:08:52 +00:00
|
|
|
Prefix: %{webdir}
|
2011-11-01 13:11:52 +00:00
|
|
|
exec_prefix: ${prefix}
|
|
|
|
bindir: %{rt_bindir}
|
|
|
|
sbindir: %{rt_sbindir}
|
2021-04-20 08:44:14 +00:00
|
|
|
sysconfdir: %{rt_sysconfdir}
|
|
|
|
mandir: %{rt_mandir}
|
2011-11-01 13:11:52 +00:00
|
|
|
plugindir: ${prefix}/plugins
|
2021-04-20 08:44:14 +00:00
|
|
|
libdir: %{rt_libdir}
|
2011-11-01 13:11:52 +00:00
|
|
|
datadir: ${prefix}/share
|
2021-04-20 08:44:14 +00:00
|
|
|
htmldir: %{rt_wwwdir}
|
2011-11-01 13:11:52 +00:00
|
|
|
fontdir: ${datadir}/fonts
|
|
|
|
lexdir: ${datadir}/po
|
2013-10-04 17:10:49 +00:00
|
|
|
staticdir: ${datadir}/static
|
2021-04-20 08:44:14 +00:00
|
|
|
manualdir: ${prefix}/doc
|
|
|
|
localstatedir: %{rt_localstatedir}
|
|
|
|
logfiledir: %{rt_logdir}
|
|
|
|
masonstatedir: %{rt_cachedir}/mason_data
|
|
|
|
sessionstatedir: %{rt_cachedir}/session_data
|
|
|
|
customdir: ${prefix}/local
|
|
|
|
custometcdir: %{rt_sysconfdir}/local/etc
|
2011-11-01 13:11:52 +00:00
|
|
|
customhtmldir: ${customdir}/html
|
|
|
|
customlexdir: ${customdir}/po
|
2013-10-04 17:10:49 +00:00
|
|
|
customstaticdir: ${customdir}/static
|
2011-11-01 13:11:52 +00:00
|
|
|
customlibdir: ${customdir}/lib
|
|
|
|
customplugindir: ${customdir}/plugins
|
|
|
|
</Layout>
|
|
|
|
EOF
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
# fix env interpreter script
|
|
|
|
for file in etc/upgrade/upgrade-mysql-schema.pl ; do
|
|
|
|
sed -i "s|/usr/bin/env perl|%{_bindir}/perl|g" "$file"
|
|
|
|
done
|
2011-11-01 13:11:52 +00:00
|
|
|
|
|
|
|
%build
|
|
|
|
%configure \
|
|
|
|
--prefix=%{webdir} \
|
|
|
|
--enable-layout="openSUSE" \
|
|
|
|
--enable-graphviz \
|
|
|
|
--enable-gd \
|
|
|
|
--enable-gpg \
|
- update to 5.0.1:
Database Changes
+ For MySQL and MariaDB, the default character set has been updated to
utf8mb4 to accommodate more unicode characters including emojis.
See README.MySQL and README.MariaDB for details.
+ The Id field in some tables is changed from INT to BIGINT to accommodate
large RT systems that may hit the maximum number of ids. Because this
change touches large RT tables like Transactions and Attachments,
this upgrade step may take a while to run.
+ You also will need free disk space equal to the size of these tables
while running because MySQL, MariaDB, and Postgres will create a temporary
copy of the table while running. If you don't have sufficient space,
it can cause this step to fail.
Notable Changes
+ System configuration options can now be changed by SuperUsers via the
web UI. File-based configuration options are still loaded. Changes made
via the web UI take precedence over file-based options if both are set.
+ If you prefer to keep all configuration in files and disable editing in
the web UI, set this option to 0:
Set($ShowEditSystemConfig, 0);
+ The variables which alter the set of HTML elements allowed in HTML
scrubbing have moved; they have been renamed, and are now found under
RT::Interface::Web::Scrubber.
+ The articles interface on tickets has been simplified, now showing only
a dropdown for selecting articles. This dropdown converts to an autocomplete
box when the dropdown contains more than $DropdownMenuLimit items.
+ With this simplified interface, the "hotlist" feature is no longer
needed as all articles in classes applied to a given queue are available
in the dropdown/autocomplete field. To prevent articles in a class from
appearing for a queue, you can unapply the class from that queue.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=67
2021-04-13 16:33:18 +00:00
|
|
|
--enable-smime \
|
|
|
|
--enable-externalauth \
|
|
|
|
--with-bin-owner="root" \
|
|
|
|
--with-libs-owner="root" \
|
|
|
|
--with-libs-group="root" \
|
|
|
|
--with-rt-group="%{rt_group}" \
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
--with-web-user="%{www_user}" \
|
|
|
|
--with-web-group="%{www_group}" \
|
2011-11-01 13:11:52 +00:00
|
|
|
--with-web-handler=fastcgi,modperl2,standalone \
|
|
|
|
--with-db-database="rt4" \
|
|
|
|
--with-db-host="localhost" \
|
|
|
|
--with-db-rt-user="rt" \
|
|
|
|
--with-db-rt-pass="rt_pass" \
|
|
|
|
--with-db-type="mysql" \
|
|
|
|
--with-rt-group="rt"
|
|
|
|
make testdeps
|
|
|
|
make %{?_smp_mflags}
|
|
|
|
|
|
|
|
%install
|
|
|
|
%makeinstall
|
2017-05-10 20:31:26 +00:00
|
|
|
|
2011-11-01 13:11:52 +00:00
|
|
|
# create missing directories
|
|
|
|
mkdir -p %{buildroot}/%{rt_localstatedir}
|
|
|
|
mkdir -p %{buildroot}/%{rt_logdir}
|
|
|
|
mkdir -p %{buildroot}/%{rt_cachedir}/{session_data,mason_data}
|
2017-05-10 20:31:26 +00:00
|
|
|
|
2011-11-01 13:11:52 +00:00
|
|
|
# Generate man-pages
|
|
|
|
mkdir -p %{buildroot}/%{rt_mandir}/man1
|
2017-05-10 20:31:26 +00:00
|
|
|
# Added missing man page
|
|
|
|
install -m 0644 %{S:13} %{buildroot}/%{rt_mandir}/man1/rt-ldapimport.1
|
|
|
|
install -m 0644 %{S:14} %{buildroot}/%{rt_mandir}/man1/rt-clean-mason-cache.1
|
|
|
|
install -m 0644 %{S:15} %{buildroot}/%{rt_mandir}/man1/rt-mysql2pg-contrib.1
|
2011-11-01 13:11:52 +00:00
|
|
|
for binary in %{buildroot}/%{_bindir}/* %{buildroot}/%{_sbindir}/* ; do
|
|
|
|
MANNAME=$(basename ${binary}.1)
|
2013-10-28 15:59:11 +00:00
|
|
|
# this fails on 13.1
|
2017-05-10 20:31:26 +00:00
|
|
|
# [ $MANNAME = "rt-validate-aliases.1" ] && break
|
2011-11-01 13:11:52 +00:00
|
|
|
test -f %{buildroot}/%{rt_mandir}/man1/$MANNAME || %{_bindir}/pod2man $binary > %{buildroot}/%{rt_mandir}/man1/$MANNAME
|
|
|
|
done
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
|
|
|
|
%if %{with systemd}
|
|
|
|
install -Dm644 request-tracker.service %{buildroot}/%{_unitdir}/request-tracker.service
|
|
|
|
ln -s %{_sbindir}/service %{buildroot}%{_sbindir}/rc%{name}
|
2020-05-04 19:07:09 +00:00
|
|
|
#
|
|
|
|
# install systemd timers
|
|
|
|
#
|
|
|
|
# rt-email-digest-daily
|
|
|
|
cat << \EOF >> %{buildroot}%{_unitdir}/rt-email-digest-daily.timer
|
|
|
|
[Unit]
|
|
|
|
Description=Request Tracker Email digest daily
|
|
|
|
|
|
|
|
[Timer]
|
|
|
|
OnBootSec=1h
|
|
|
|
OnCalendar=daily
|
|
|
|
AccuracySec=24h
|
|
|
|
Persistent=true
|
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=timers.target
|
|
|
|
EOF
|
|
|
|
cat << \EOF >> %{buildroot}%{_unitdir}/rt-email-digest-daily.service
|
|
|
|
[Unit]
|
|
|
|
Description=Daily non-interactive Request Tracker Email digest
|
|
|
|
|
|
|
|
[Service]
|
|
|
|
Type=oneshot
|
|
|
|
ExecStart=%{rt_sbindir}/rt-email-digest -m daily
|
|
|
|
EOF
|
|
|
|
|
|
|
|
# rt-email-digest-weekly
|
|
|
|
cat << \EOF >> %{buildroot}%{_unitdir}/rt-email-digest-weekly.timer
|
|
|
|
[Unit]
|
|
|
|
Description=Request Tracker Email digest weekly
|
|
|
|
|
|
|
|
[Timer]
|
|
|
|
OnBootSec=1h
|
|
|
|
OnCalendar=weekly
|
|
|
|
AccuracySec=24h
|
|
|
|
Persistent=true
|
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=timers.target
|
|
|
|
EOF
|
|
|
|
cat << \EOF >> %{buildroot}%{_unitdir}/rt-email-digest-weekly.service
|
|
|
|
[Unit]
|
|
|
|
Description=Weekly non-interactive Request Tracker Email digest
|
|
|
|
|
|
|
|
[Service]
|
|
|
|
Type=oneshot
|
|
|
|
ExecStart=%{rt_sbindir}/rt-email-digest -m weekly
|
|
|
|
EOF
|
|
|
|
|
|
|
|
# rt-email-dashboard
|
|
|
|
cat << \EOF >> %{buildroot}%{_unitdir}/rt-email-dashboard.timer
|
|
|
|
[Unit]
|
|
|
|
Description=Request Tracker Email Dashboard update hourly
|
|
|
|
|
|
|
|
[Timer]
|
|
|
|
OnBootSec=1h
|
|
|
|
OnCalendar=hourly
|
|
|
|
Persistent=true
|
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=timers.target
|
|
|
|
EOF
|
|
|
|
cat << \EOF >> %{buildroot}%{_unitdir}/rt-email-dashboard.service
|
|
|
|
[Unit]
|
|
|
|
Description=Hourly Request Tracker Email dashboard update
|
|
|
|
|
|
|
|
[Service]
|
|
|
|
Type=oneshot
|
|
|
|
ExecStart=%{rt_sbindir}/rt-email-dashboards
|
|
|
|
EOF
|
|
|
|
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%else
|
2011-11-01 13:11:52 +00:00
|
|
|
# install init script that creates needed directories on demand during boot
|
|
|
|
install -Dm755 rcrequest-tracker %{buildroot}/%{_sysconfdir}/init.d/%{name}
|
2011-12-30 10:57:16 +00:00
|
|
|
mkdir -p %{buildroot}/%{_sbindir} && pushd %{buildroot}/%{_sbindir}
|
|
|
|
ln -s %{_sysconfdir}/init.d/%{name} rc%{name}
|
|
|
|
popd
|
2020-05-04 19:07:09 +00:00
|
|
|
# install cron jobs
|
|
|
|
for i in cron.daily cron.weekly cron.hourly ; do
|
|
|
|
mkdir -p %{buildroot}/%{_sysconfdir}/$i
|
|
|
|
mv suse.de-request-tracker.$i %{buildroot}/%{_sysconfdir}/$i/
|
|
|
|
chmod +x %{buildroot}/%{_sysconfdir}/$i/*
|
|
|
|
done
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%endif
|
2011-11-01 13:11:52 +00:00
|
|
|
# install README for db-backend docs
|
|
|
|
cat << \EOF >> README.db-backend
|
|
|
|
This package provides dependencies and support for using Request Tracker with the desired database.
|
2012-03-12 19:24:56 +00:00
|
|
|
|
|
|
|
= New installation =
|
|
|
|
|
|
|
|
For the initial setup, please follow these steps:
|
|
|
|
1) Create database and database user
|
|
|
|
|
2024-03-08 10:08:52 +00:00
|
|
|
For mysql, this looks like (rt4 == your_database;
|
2012-03-12 19:24:56 +00:00
|
|
|
rt_pass == your_password; rt = your_rt_user):
|
|
|
|
~# mysqladmin create rt4
|
|
|
|
~# mysql -u root
|
|
|
|
mysql> grant all on rt4.* to 'rt'@'localhost' identified by 'rt_pass';
|
|
|
|
mysql> flush privileges;
|
|
|
|
mysql> quit
|
|
|
|
|
|
|
|
2) Create database tables
|
|
|
|
|
|
|
|
The schemata for the RT tables are placed in %{}
|
|
|
|
|
2024-03-08 10:08:52 +00:00
|
|
|
For mysql with 'rt4' being your RT database, the commandline to create
|
2012-03-12 19:24:56 +00:00
|
|
|
the tables looks like:
|
|
|
|
~# mysql rt4 < /etc/request-tracker/schema.mysql
|
|
|
|
|
2024-03-08 10:08:52 +00:00
|
|
|
3) Start the rt-server
|
2012-03-12 19:24:56 +00:00
|
|
|
|
2024-03-08 10:08:52 +00:00
|
|
|
Make sure that there is no other service running on port 80 on your machine
|
2012-03-12 19:24:56 +00:00
|
|
|
(like apache) - and start the stand-alone rt-server:
|
|
|
|
~# /usr/sbin/rt-server
|
|
|
|
|
|
|
|
4) Do the needed initial setup via the WebUI:
|
2024-03-08 10:08:52 +00:00
|
|
|
Start your browser and visit the URL http://0:80/ to configure RT and
|
2012-03-12 19:24:56 +00:00
|
|
|
initialize your database.
|
|
|
|
|
|
|
|
= Existing installation =
|
|
|
|
|
2024-03-08 10:08:52 +00:00
|
|
|
If this is an existing RT installation, consult
|
2012-03-12 19:24:56 +00:00
|
|
|
%{_defaultdocdir}/%{name}/README, beginning from step 6b
|
2011-11-01 13:11:52 +00:00
|
|
|
EOF
|
|
|
|
# install cleanup script for Mason Cache
|
|
|
|
install -Dm755 %{SOURCE9} %{buildroot}%{rt_sbindir}/rt-clean-mason-cache
|
|
|
|
sed -i "s|__RT_CACHEDIR__|%{rt_cachedir}|g;
|
|
|
|
s|__SYSCONFDIR__|%{_sysconfdir}|g" %{buildroot}%{rt_sbindir}/rt-clean-mason-cache
|
|
|
|
# install MySQL to PostgreSQL conversion perl script
|
2013-01-17 14:31:17 +00:00
|
|
|
install -Dm755 %{SOURCE11} %{buildroot}%{rt_sbindir}/rt-mysql2pg-contrib
|
2011-11-01 13:11:52 +00:00
|
|
|
# install logrotate stuff
|
|
|
|
mkdir -p %{buildroot}/%{rt_logdir}
|
|
|
|
mkdir -p %{buildroot}/%{_sysconfdir}/logrotate.d
|
|
|
|
sed -e "s|__RT_LOGDIR__|%{rt_logdir}|g" %{SOURCE2} > %{buildroot}/%{_sysconfdir}/logrotate.d/%{name}
|
2013-07-01 00:25:03 +00:00
|
|
|
%if 0%{?suse_version} > 01210
|
|
|
|
echo " su %{rt_user} %{rt_group}" >> %{buildroot}/%{_sysconfdir}/logrotate.d/%{name}
|
|
|
|
%endif
|
|
|
|
echo "}" >> %{buildroot}/%{_sysconfdir}/logrotate.d/%{name}
|
2011-11-01 13:11:52 +00:00
|
|
|
# install upgrade files
|
|
|
|
mkdir -p %{buildroot}/%{webdir}/etc/
|
|
|
|
cp -r etc/upgrade %{buildroot}/%{webdir}/etc/
|
|
|
|
rm %{buildroot}/%{webdir}/etc/upgrade/*.in
|
|
|
|
find %{buildroot}/%{webdir}/etc/upgrade -size 0b -exec rm {} \;
|
|
|
|
find %{buildroot}/%{webdir}/etc/upgrade -name "schema.*" -exec chmod 644 {} \;
|
|
|
|
find %{buildroot}/%{webdir}/etc/upgrade -name "acl.*" -exec chmod 644 {} \;
|
|
|
|
find %{buildroot}/%{webdir}/etc/upgrade -name "*.pl" -exec chmod 750 {} \;
|
2017-05-10 20:31:26 +00:00
|
|
|
# remove duplicate files
|
2011-11-01 13:11:52 +00:00
|
|
|
%fdupes %{buildroot}/%{webdir}
|
2017-05-10 20:31:26 +00:00
|
|
|
%fdupes %{buildroot}/%{rt_sysconfdir}
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
# remove zero size config files
|
|
|
|
find %{buildroot}%{rt_sysconfdir}/upgrade/ -size 0 -delete
|
|
|
|
# install helper script
|
2024-03-08 10:08:52 +00:00
|
|
|
install -Dm755 request-tracker-prepare.sh %{buildroot}/%{rt_sbindir}/request-tracker-prepare.sh
|
2011-11-01 13:11:52 +00:00
|
|
|
# install sysconfig file
|
2018-09-12 21:48:21 +00:00
|
|
|
mkdir -p %{buildroot}%{_fillupdir}
|
|
|
|
mv sysconfig.%{name} %{buildroot}/%{_fillupdir}/
|
2011-11-01 13:11:52 +00:00
|
|
|
# install apache configs
|
|
|
|
mkdir -p %{buildroot}/%{rt_sysconfdir}/apache2
|
|
|
|
install -m644 %{SOURCE7} %{buildroot}/%{rt_sysconfdir}/apache2/
|
|
|
|
install -m644 %{SOURCE8} %{buildroot}/%{rt_sysconfdir}/apache2/
|
2021-04-20 08:44:14 +00:00
|
|
|
# install GnuPG and SMIME directories
|
2021-04-20 21:01:46 +00:00
|
|
|
mkdir -p %{buildroot}%{rt_localstatedir}/data/{gpg,smime,RT-Shredder}
|
2011-11-01 13:11:52 +00:00
|
|
|
|
|
|
|
%clean
|
|
|
|
rm -rf %{buildroot}
|
|
|
|
|
|
|
|
%pre
|
|
|
|
# in case of a fresh install, we do a bit of setup
|
|
|
|
if [ $1 -eq 1 ]; then
|
2018-09-12 21:48:21 +00:00
|
|
|
# set up user credentials
|
|
|
|
%{_sbindir}/groupadd -r %{rt_group} 2>/dev/null || :
|
|
|
|
%{_sbindir}/useradd -r -g %{rt_group} -d %{webdir} -s /sbin/nologin -c "Request Tracker User" %{rt_user} 2>/dev/null || :
|
|
|
|
%if 0%{?suse_version} > 01210
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%{_sbindir}/usermod -a -G %{rt_group} %{www_user} 2>/dev/null || :
|
2018-09-12 21:48:21 +00:00
|
|
|
%else
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%{_sbindir}/groupmod -A %{www_group} %{rt_group} 2>/dev/null || :
|
2018-09-12 21:48:21 +00:00
|
|
|
%endif
|
|
|
|
%if %{with systemd}
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%service_add_pre %{name}.service
|
2018-09-12 21:48:21 +00:00
|
|
|
%service_add_pre apache2.service
|
|
|
|
%service_add_pre mysql.service
|
|
|
|
%service_add_pre postfix.service
|
2020-05-04 19:07:09 +00:00
|
|
|
%service_add_pre rt-email-dashboard.timer rt-email-digest-daily.timer rt-email-digest-weekly.timer
|
2018-09-12 21:48:21 +00:00
|
|
|
%else
|
|
|
|
%fillup_and_insserv -f apache2
|
|
|
|
%fillup_and_insserv -f mysql
|
|
|
|
%fillup_and_insserv -f postfix
|
|
|
|
%endif
|
2011-11-01 13:11:52 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
%preun
|
2018-09-12 21:48:21 +00:00
|
|
|
%if %{with systemd}
|
|
|
|
%service_del_preun apache2.service
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%service_del_preun %{name}.service
|
2020-05-04 19:07:09 +00:00
|
|
|
%service_del_preun rt-email-dashboard.timer rt-email-digest-daily.timer rt-email-digest-weekly.timer
|
2018-09-12 21:48:21 +00:00
|
|
|
%else
|
|
|
|
%restart_on_update apache2
|
|
|
|
%stop_on_removal %{name}
|
|
|
|
%endif
|
2011-11-01 13:11:52 +00:00
|
|
|
|
|
|
|
%post
|
|
|
|
# enable perl in apache config
|
|
|
|
if [ -x %{_sbindir}/a2enmod ]; then
|
|
|
|
if grep -q perl %{_sysconfdir}/sysconfig/apache2 1>&2 2>/dev/null; then
|
|
|
|
%{_sbindir}/a2enmod perl >/dev/null
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
if [ $1 -eq 2 ]; then
|
2013-06-06 07:04:28 +00:00
|
|
|
echo "Please consult %{_defaultdocdir}/%{name}/README.SuSE and %{_defaultdocdir}/%{name}/README, beginning from step 6b."
|
2013-10-09 17:27:49 +00:00
|
|
|
echo "NOTE: %{_var}/run/%{name} has been changed to %{_var}/lib/%{name}...you'll need to migrate said data accordingly"
|
2011-11-01 13:11:52 +00:00
|
|
|
fi
|
2018-09-12 21:48:21 +00:00
|
|
|
%if %{with systemd}
|
|
|
|
%service_add_post apache2
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%service_add_post %{name}.service
|
2020-05-04 19:07:09 +00:00
|
|
|
%service_add_post rt-email-dashboard.timer rt-email-digest-daily.timer rt-email-digest-weekly.timer
|
2018-09-12 21:48:21 +00:00
|
|
|
%fillup_only
|
|
|
|
%else
|
|
|
|
%restart_on_update apache2
|
|
|
|
%restart_on_update %{name}
|
|
|
|
%fillup_and_insserv %{name}
|
|
|
|
%endif
|
2011-11-01 13:11:52 +00:00
|
|
|
|
|
|
|
%postun
|
2018-09-12 21:48:21 +00:00
|
|
|
%if %{with systemd}
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%service_del_postun %{name}.service
|
2020-05-04 19:07:09 +00:00
|
|
|
%service_del_postun rt-email-dashboard.timer rt-email-digest-daily.timer rt-email-digest-weekly.timer
|
2018-09-12 21:48:21 +00:00
|
|
|
%else
|
2011-11-01 13:11:52 +00:00
|
|
|
%{insserv_cleanup}
|
2018-09-12 21:48:21 +00:00
|
|
|
%endif
|
2011-11-01 13:11:52 +00:00
|
|
|
|
|
|
|
%files
|
|
|
|
%defattr(-,root,root)
|
2024-09-20 13:52:26 +00:00
|
|
|
%doc README.md README.Oracle README.SUSE
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%if 0%{?suse_version} >= 01500
|
|
|
|
%license COPYING
|
|
|
|
%else
|
|
|
|
%doc COPYING
|
|
|
|
%endif
|
2011-11-01 13:11:52 +00:00
|
|
|
%doc %{rt_mandir}/man1/*
|
|
|
|
%dir %{webdir}
|
|
|
|
%dir %{rt_sysconfdir}
|
|
|
|
%dir %{perl_vendorlib}/RT
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%attr(-,%{rt_user},%{www_group}) %dir %{rt_cachedir}
|
|
|
|
%attr(-,%{rt_user},%{www_group}) %dir %{rt_cachedir}/session_data
|
|
|
|
%attr(-,%{rt_user},%{www_group}) %dir %{rt_cachedir}/mason_data
|
|
|
|
%attr(-,%{rt_user},%{www_group}) %dir %{rt_cachedir}/mason_data/cache
|
|
|
|
%attr(-,%{rt_user},%{www_group}) %dir %{rt_cachedir}/mason_data/obj
|
|
|
|
%attr(0775,%{rt_user},%{www_group}) %dir %{rt_logdir}
|
2013-10-29 15:13:10 +00:00
|
|
|
%attr(-,%{rt_user},%{rt_group}) %dir %{rt_localstatedir}
|
2021-04-20 21:03:39 +00:00
|
|
|
%attr(0770,%{rt_user},%{www_group}) %dir %{rt_localstatedir}/data
|
|
|
|
%attr(0770,%{rt_user},%{www_group}) %dir %{rt_localstatedir}/data/gpg
|
|
|
|
%attr(0770,%{rt_user},%{www_group}) %dir %{rt_localstatedir}/data/smime
|
|
|
|
%attr(0770,%{rt_user},%{www_group}) %dir %{rt_localstatedir}/data/RT-Shredder
|
- update to 5.0.1:
Database Changes
+ For MySQL and MariaDB, the default character set has been updated to
utf8mb4 to accommodate more unicode characters including emojis.
See README.MySQL and README.MariaDB for details.
+ The Id field in some tables is changed from INT to BIGINT to accommodate
large RT systems that may hit the maximum number of ids. Because this
change touches large RT tables like Transactions and Attachments,
this upgrade step may take a while to run.
+ You also will need free disk space equal to the size of these tables
while running because MySQL, MariaDB, and Postgres will create a temporary
copy of the table while running. If you don't have sufficient space,
it can cause this step to fail.
Notable Changes
+ System configuration options can now be changed by SuperUsers via the
web UI. File-based configuration options are still loaded. Changes made
via the web UI take precedence over file-based options if both are set.
+ If you prefer to keep all configuration in files and disable editing in
the web UI, set this option to 0:
Set($ShowEditSystemConfig, 0);
+ The variables which alter the set of HTML elements allowed in HTML
scrubbing have moved; they have been renamed, and are now found under
RT::Interface::Web::Scrubber.
+ The articles interface on tickets has been simplified, now showing only
a dropdown for selecting articles. This dropdown converts to an autocomplete
box when the dropdown contains more than $DropdownMenuLimit items.
+ With this simplified interface, the "hotlist" feature is no longer
needed as all articles in classes applied to a given queue are available
in the dropdown/autocomplete field. To prevent articles in a class from
appearing for a queue, you can unapply the class from that queue.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=67
2021-04-13 16:33:18 +00:00
|
|
|
%config %{rt_sysconfdir}/cpanfile
|
2018-10-07 20:22:57 +00:00
|
|
|
%config(noreplace) %{rt_sysconfdir}/initialdata
|
|
|
|
%config(noreplace) %{rt_sysconfdir}/RT_SiteConfig.d
|
|
|
|
%config(noreplace) %{rt_sysconfdir}/apache2
|
|
|
|
%config(noreplace) %{rt_sysconfdir}/local
|
|
|
|
%config(noreplace) %{rt_sysconfdir}/upgrade
|
2011-11-01 13:11:52 +00:00
|
|
|
%exclude %{rt_sysconfdir}/schema.*
|
|
|
|
%exclude %{rt_sysconfdir}/acl.*
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%attr(-,root,%{www_group}) %config %{rt_sysconfdir}/RT_Config.pm
|
|
|
|
%attr(-,root,%{www_group}) %config %{rt_sysconfdir}/RT_SiteConfig.pm
|
2011-11-01 13:11:52 +00:00
|
|
|
%config(noreplace) %{_sysconfdir}/logrotate.d/%{name}
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%if %{with systemd}
|
|
|
|
%{_unitdir}/request-tracker.service
|
2020-05-04 19:07:09 +00:00
|
|
|
%{_unitdir}/rt-email-digest-daily.service
|
|
|
|
%{_unitdir}/rt-email-digest-daily.timer
|
|
|
|
%{_unitdir}/rt-email-digest-weekly.service
|
|
|
|
%{_unitdir}/rt-email-digest-weekly.timer
|
|
|
|
%{_unitdir}/rt-email-dashboard.service
|
|
|
|
%{_unitdir}/rt-email-dashboard.timer
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%else
|
2011-11-01 13:11:52 +00:00
|
|
|
%{_sysconfdir}/init.d/%{name}
|
2020-05-04 19:07:09 +00:00
|
|
|
%config %{_sysconfdir}/cron.*/*
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%endif
|
2011-11-01 13:11:52 +00:00
|
|
|
%{rt_sbindir}/*
|
2013-01-17 14:31:17 +00:00
|
|
|
%exclude %{rt_sbindir}/rt-mysql2pg-contrib
|
2011-11-01 13:11:52 +00:00
|
|
|
%{rt_bindir}/*
|
|
|
|
%exclude %{rt_bindir}/rt-mailgate
|
|
|
|
%exclude %{rt_mandir}/man1/rt-mailgate.1*
|
2018-10-07 20:58:55 +00:00
|
|
|
%exclude %{rt_mandir}/man1/rt-mysql2pg-contrib.1*
|
2011-11-01 13:11:52 +00:00
|
|
|
%{perl_vendorlib}/RT.pm
|
|
|
|
%{perl_vendorlib}/RT/*
|
|
|
|
%{webdir}/*
|
2018-09-12 21:48:21 +00:00
|
|
|
%{_fillupdir}/sysconfig.%{name}
|
2011-11-01 13:11:52 +00:00
|
|
|
|
|
|
|
%files mailgate
|
|
|
|
%defattr(-,root,root,-)
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%if 0%{?suse_version} >= 01500
|
|
|
|
%license COPYING
|
|
|
|
%else
|
2011-11-01 13:11:52 +00:00
|
|
|
%doc COPYING
|
- update to 4.4.4:
Security Updates
+ One of RT's dependencies, the Perl module Email::Address, has a denial
of service vulnerability which could induce a denial of service of RT
itself.
We recommend updating to Email::Address version 1.912 or later. The
Email::Address vulnerabilities are assigned CVE-2015-7686 and CVE-2015-12558.
CVE-2015-7686 was addressed in RT with a previous update.
Email::Address version 1.912 addresses both of these CVEs with updates
directly in the source module.
+ One of RT's dependencies, the Perl module Email::Address::List, relies
on and operates similarly to Email::Address and therefore also has
potential denial of service vulnerabilities.
These vulnerabilities are assigned CVE-2018-18898. We recommend
administrators install Email::Address::List version 0.06 or later.
+ An optional RT dependency, HTML::Gumbo, incorrectly escaped HTML in
some cases. Since RT relies on this module to escape HTML content,
it's possible this issue could allow malicious HTML to be displayed
in RT.
For RT's using this optional module, we recommend administrators
install HTML::Gumbo version 0.18 or later.
* The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting
(XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251.
RT does not use this jQuery feature so it is not directly vulnerable.
jQuery version 1.12 no longer receives official updates, however a
fix was posted with recommendations for applications to patch locally,
so RT will follow this recommendation and ship with a patched version.
EU General Data Protection Regulation (GDPR)
Several new features were added to support GDPR compliance and are summarized here.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=61
2019-03-14 13:50:49 +00:00
|
|
|
%endif
|
2011-11-01 13:11:52 +00:00
|
|
|
%{rt_bindir}/rt-mailgate
|
|
|
|
%{rt_mandir}/man1/rt-mailgate*
|
|
|
|
|
|
|
|
%files db-postgres
|
|
|
|
%defattr(-,root,root)
|
|
|
|
%doc README.db-backend
|
2013-01-17 14:31:17 +00:00
|
|
|
%{rt_sbindir}/rt-mysql2pg-contrib
|
2018-10-07 20:51:02 +00:00
|
|
|
%doc %{rt_mandir}/man1/rt-mysql2pg-contrib.1*
|
2011-11-01 13:11:52 +00:00
|
|
|
%config %{rt_sysconfdir}/acl.Pg
|
|
|
|
%config %{rt_sysconfdir}/schema.Pg
|
|
|
|
|
|
|
|
%files db-mysql
|
|
|
|
%defattr(-,root,root)
|
|
|
|
%doc README.db-backend
|
|
|
|
%config %{rt_sysconfdir}/acl.mysql
|
|
|
|
%config %{rt_sysconfdir}/schema.mysql
|
|
|
|
|
|
|
|
%files db-sqlite
|
|
|
|
%defattr(-,root,root)
|
|
|
|
%doc README.db-backend
|
|
|
|
%config %{rt_sysconfdir}/schema.SQLite
|
|
|
|
|
|
|
|
%files db-oracle
|
|
|
|
%defattr(-,root,root)
|
|
|
|
%doc README.db-backend
|
|
|
|
%config %{rt_sysconfdir}/acl.Oracle
|
|
|
|
%config %{rt_sysconfdir}/schema.Oracle
|
|
|
|
|
- update to 5.0.1:
Database Changes
+ For MySQL and MariaDB, the default character set has been updated to
utf8mb4 to accommodate more unicode characters including emojis.
See README.MySQL and README.MariaDB for details.
+ The Id field in some tables is changed from INT to BIGINT to accommodate
large RT systems that may hit the maximum number of ids. Because this
change touches large RT tables like Transactions and Attachments,
this upgrade step may take a while to run.
+ You also will need free disk space equal to the size of these tables
while running because MySQL, MariaDB, and Postgres will create a temporary
copy of the table while running. If you don't have sufficient space,
it can cause this step to fail.
Notable Changes
+ System configuration options can now be changed by SuperUsers via the
web UI. File-based configuration options are still loaded. Changes made
via the web UI take precedence over file-based options if both are set.
+ If you prefer to keep all configuration in files and disable editing in
the web UI, set this option to 0:
Set($ShowEditSystemConfig, 0);
+ The variables which alter the set of HTML elements allowed in HTML
scrubbing have moved; they have been renamed, and are now found under
RT::Interface::Web::Scrubber.
+ The articles interface on tickets has been simplified, now showing only
a dropdown for selecting articles. This dropdown converts to an autocomplete
box when the dropdown contains more than $DropdownMenuLimit items.
+ With this simplified interface, the "hotlist" feature is no longer
needed as all articles in classes applied to a given queue are available
in the dropdown/autocomplete field. To prevent articles in a class from
appearing for a queue, you can unapply the class from that queue.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/request-tracker?expand=0&rev=67
2021-04-13 16:33:18 +00:00
|
|
|
%files attachment-storage-S3
|
|
|
|
%defattr(-,root,root)
|
|
|
|
%doc README.S3
|
|
|
|
|
|
|
|
%files attachment-storage-Dropbox
|
|
|
|
%defattr(-,root,root)
|
|
|
|
%doc README.Dropbox
|
|
|
|
|
2011-11-01 13:11:52 +00:00
|
|
|
%changelog
|