Accepting request 639470 from server:mail

- update pigeonhole to 0.5.3
- update to 2.3.3

OBS-URL: https://build.opensuse.org/request/show/639470
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dovecot23?expand=0&rev=11
This commit is contained in:
Dominique Leuenberger 2018-10-02 17:49:09 +00:00 committed by Git OBS Bridge
commit b44c98a49d
11 changed files with 104 additions and 88 deletions

View File

@ -1,49 +0,0 @@
From 4ff4bd024a9b6e7973b76b186ce085c2ca669d3e Mon Sep 17 00:00:00 2001
From: Aki Tuomi <aki.tuomi@dovecot.fi>
Date: Thu, 24 May 2018 12:48:58 +0000
Subject: [PATCH] acl: Fix return value of acl_attribute_get_acl
If matching acl entry is not found, it must return 0
and not 1 because it did not find anything.
Fixes dsync: Panic: file mailbox-attribute.c: line 362 (mailbox_attribute_get_stream): assertion failed: (value_r->value != NULL || value_r->value_stream != NULL)
Broken in 37c72fa0cd3f1d74d79b64afb3fb6da5ffd4fe3a
Found by @dl8bh
---
src/plugins/acl/acl-attributes.c | 10 ++++++++--
1 file changed, 8 insertions(+), 2 deletions(-)
diff --git a/src/plugins/acl/acl-attributes.c b/src/plugins/acl/acl-attributes.c
index 2499a30f9c..f0d3177de4 100644
--- a/src/plugins/acl/acl-attributes.c
+++ b/src/plugins/acl/acl-attributes.c
@@ -60,7 +60,7 @@ static int acl_attribute_get_acl(struct mailbox *box, const char *key,
struct acl_object_list_iter *iter;
struct acl_rights rights, wanted_rights;
const char *id;
- int ret;
+ int ret = 0;
i_zero(value_r);
@@ -88,11 +88,17 @@ static int acl_attribute_get_acl(struct mailbox *box, const char *key,
rights.id_type == wanted_rights.id_type &&
null_strcmp(rights.identifier, wanted_rights.identifier) == 0) {
value_r->value = acl_rights_export(&rights);
+ ret = 1;
break;
}
}
- if ((ret = acl_object_list_deinit(&iter)) < 0)
+ /* the return value here cannot be used, because this function
+ needs to return whether it actually matched something
+ or not */
+ if (acl_object_list_deinit(&iter) < 0) {
mail_storage_set_internal_error(box->storage);
+ ret = -1;
+ }
return ret;
}

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:950e8e15c58e539761255e140dd3678dd2477fa432a5f2b804e53821bdc02535
size 1814618

View File

@ -1,11 +0,0 @@
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAABAgAGBQJbNd5gAAoJEATWKx49+7T0FAsH/RTJSMhVswyOOTGXPrU8EqNv
cNb5oWxoI+UOw1UuxOHqYvaXPDHVo5rB8eY9uUelNbaz28CxKjJmOABJbqwHIuNc
R4WSdgTBLX/Yo196rkIDtZhM8mlEUDDPIgLIztcoILNJ6nllAC6ftft5gTcQ1QKy
f3Fvbsf9YkEsVHKoaDWz/8/Twq2QvHiGaa1jhtdPDnjyLqT6OxHStTiitMQ9Lzvn
881OVRrpJxmKkuEPNcP/hl4b6FrPxFsfzD4VdwZOavmPDQOVh43dNyCnORBxIjCe
pTQO/LO4XUHyMkGOePbViXIAnygqcunXUoV1Vwgh8BgB0zoJSyFxHuxnSJ0fy/0=
=eD05
-----END PGP SIGNATURE-----

View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:e02f2741c05f9e2af1c5f46da35efb74997f9d4b941ba68936206d310ddf2622
size 1827329

View File

@ -0,0 +1,11 @@
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAABAgAGBQJbsp3qAAoJEATWKx49+7T0dBgH/2e9ovTEUf64tGNuwoVznw3V
Lbl2TgZc/lE+5NDa7xyK7YqUqWrHDf84qFxjHFzh/OPY8HEWlrZu52ardW5tgPZk
equGr7K7Kn/5zer6Y2uG0fy6J83Ew1L6MQUgfL7+IvJ0unCua51FijzHUaVFYUlH
ABR4iq9nZbin7gkZhAw6UxMUN65O5KxAY+POh/mNJE6ldx6syeALPQPue5UWv4nc
XcXcG1Bo8n4VG+JisLQ2CxJwj3R/6eC6HMOOH4sL0lvozHLt+JcX8htd/RWPJqVp
gP/qfGlpi7RINRFxKbOaRbZEVTFuEX/3CMR+0puyrs/E1sjSYWFVdhrJcIPhj0U=
=YK5y
-----END PGP SIGNATURE-----

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:4a65118508dc7a562e5f90dd7c3f56219fff22367c496f17d77cd0c7e2724e34
size 6797491

View File

@ -1,17 +0,0 @@
-----BEGIN PGP SIGNATURE-----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=fUQw
-----END PGP SIGNATURE-----

3
dovecot-2.3.3.tar.gz Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:15af27ee25258afb4ad9581f8df681be998b763597086bbae54ca7d77a066d8e
size 6851107

17
dovecot-2.3.3.tar.gz.sig Normal file
View File

@ -0,0 +1,17 @@
-----BEGIN PGP SIGNATURE-----
iQJLBAABCAA1FiEEK+dKqz7nVN+5yA0zGKNIru1AnaEFAluyRxEXHGRvdmVjb3Qt
Y2VAZG92ZWNvdC5vcmcACgkQGKNIru1AnaFrOA//TyyA9WlPkEYtVRZ2Qc2er7dP
U2apfuNas9mWqMwOZuKLIEe8Tsqxlb5P2EJW928hKsWzzLnjn+ipm7IlOSR/T1I6
AM6FyDjG1jrh0ky1TbXnZqnDQqovPvBM75jl5An6n9LmRI2EgmE6Sg0k7y9PavsH
s+vadgiGDY4wyMrKE+wvmbqO1WJXCzTJ2/vdwRnFEDWHmxrmkc+qJs7X5h/oB+4O
b/mG5vaE1RCBYmtIkJxwe7hhICGl/kCvDSVUYpmD44Q9lgF0vIvo38FNTwZ7rwjV
FiXRORSltbNHH0/JasKEVnPvY0/ayRCknzAtb6Usf8xAGCQ07kHTku4Cq5g1UmYz
E7QuQwn7O0EkRAon8Mj4I3RUy0oTUFn63cYUVLGYANoL5k3v+g+EGZVsAEXvRSVg
weIiam5+NfUJqe4WjVZAZ7CAGVpxtqiYXOiiogDOyiVj1d59CV9lWLi4cemMeZUR
c1tto5/VAwEdhoVWA9v31nQVEfWsWJPuejBq9uCx4q1U2K7lCaQabsAkB/yLwBLq
+zbwVrhW9mT5oDjLwnXUfwmdgy3q7xeqOb9I9g/dIbCaC4sY5yf68wIGz7bvO0qe
QyTgNmU+WCkdkMAxHhm+ZgiNC1nIjveodvLnsrkxucmpUcfdodUm+6001CRyjlwJ
aLFCQjeQUzprOkM35HU=
=K81s
-----END PGP SIGNATURE-----

View File

@ -1,3 +1,70 @@
-------------------------------------------------------------------
Mon Oct 1 22:55:38 UTC 2018 - Marcus Rueckert <mrueckert@suse.de>
- update pigeonhole to 0.5.3
- Fix assertion panic occurring when managesieve service fails to
open INBOX while saving a Sieve script. This was caused by a
lack of cleanup after failure.
- Fix specific messages causing an assert panic with actions that
compose a reply (e.g. vacation). With some rather weird input
from the original message, the header folding algorithm (as
used for composing the References header for the reply) got
confused, causing the panic.
- IMAP FILTER=SIEVE capability: Fix FILTER SIEVE SCRIPT command
parsing. After finishing reading the Sieve script, the command
parsing sometimes didn't continue with the search arguments.
This is a time- critical bug that likely only occurs when the
Sieve script is sent in the next TCP frame.
-------------------------------------------------------------------
Mon Oct 1 22:54:12 UTC 2018 - Marcus Rueckert <mrueckert@suse.de>
- update to 2.3.3
* doveconf hides more secrets now in the default output.
* ssl_dh setting is no longer enforced at startup. If it's not
set and non-ECC DH key exchange happens, error is logged and
client is disconnected.
+ Added log_debug=<filter> setting.
+ Added log_core_filter=<log filter> setting.
+ quota-clone: Write to dict asynchronously
+ --enable-hardening attempts to use retpoline Spectre 2
mitigations
+ lmtp proxy: Support source_ip passdb extra field.
+ doveadm stats dump: Support more fields and output stddev
by default.
+ push-notification: Add SSL support for OX backend.
- NUL bytes in mail headers can cause truncated replies when
fetched.
- director: Conflicting host up/down state changes may in some
rare situations ended up in a loop of two directors constantly
overwriting each others' changes.
- director: Fix hang/crash when multiple doveadm commands are
being handled concurrently.
- director: Fix assert-crash if doveadm disconnects too early
- virtual plugin: Some searches used 100% CPU for many seconds
- dsync assert-crashed with acl plugin in some situations.
- mail_attachment_detection_options=add-flags-on-save
assert-crashed with some specific Sieve scripts.
- Mail snippet generation crashed with mails containing invalid
Content-Type:multipart header.
- Log prefix ordering was different for some log lines.
- quota: With noenforcing option current quota usage wasn't
updated.
- auth: Kerberos authentication against Samba assert-crashed.
- stats clients were unnecessarily chatty with the stats server.
- imapc: Fixed various assert-crashes when reconnecting to
server.
- lmtp, submission: Fix potential crash if client disconnects
while handling a command.
- quota: Fixed compiling with glibc-2.26 / support libtirpc.
- fts-solr: Empty search values resulted in 400 Bad Request
errors
- fts-solr: default_ns parameter couldn't be used
- submission server crashed if relay server returned over 7 lines
in a reply (e.g. to EHLO)
- dropped 4ff4bd024a9b6e7973b76b186ce085c2ca669d3e.patch:
included in update
-------------------------------------------------------------------
Fri Jul 13 21:23:16 UTC 2018 - mrueckert@suse.de

View File

@ -17,11 +17,11 @@
Name: dovecot23
Version: 2.3.2.1
Version: 2.3.3
Release: 0
%define pkg_name dovecot
%define dovecot_version 2.3.2.1
%define dovecot_pigeonhole_version 0.5.2
%define dovecot_version 2.3.3
%define dovecot_pigeonhole_version 0.5.3
%define dovecot_branch 2.3
%define dovecot_pigeonhole_source_dir %{pkg_name}-%{dovecot_branch}-pigeonhole-%{dovecot_pigeonhole_version}
%define dovecot_pigeonhole_docdir %{_docdir}/%{pkg_name}/dovecot-pigeonhole
@ -136,7 +136,6 @@ Source11: http://pigeonhole.dovecot.org/releases/%{dovecot_branch}/%{dovec
Source12: dovecot23.keyring
Patch: dovecot-2.3.0-dont_use_etc_ssl_certs.patch
Patch1: dovecot-2.3.0-better_ssl_defaults.patch
Patch2: https://github.com/dovecot/core/commit/4ff4bd024a9b6e7973b76b186ce085c2ca669d3e.patch
Summary: IMAP and POP3 Server Written Primarily with Security in Mind
License: BSD-3-Clause AND LGPL-2.1-or-later AND MIT
Group: Productivity/Networking/Email/Servers
@ -316,7 +315,6 @@ dovecot tree.
%setup -q -n %{pkg_name}-%{dovecot_version} -a 1
%patch -p1
%patch1 -p1
%patch2 -p1
gzip -9v ChangeLog
# Fix plugins dir.
sed -i 's|#mail_plugin_dir = /usr/lib/dovecot|mail_plugin_dir = %{_libdir}/dovecot/modules|' doc/example-config/conf.d/10-mail.conf