2007-01-16 00:12:14 +01:00
|
|
|
#
|
2011-06-06 16:30:41 +02:00
|
|
|
# spec file for package fetchmail
|
2007-01-16 00:12:14 +01:00
|
|
|
#
|
2021-01-04 11:39:54 +01:00
|
|
|
# Copyright (c) 2021 SUSE LLC
|
2007-01-16 00:12:14 +01:00
|
|
|
#
|
2008-08-23 00:22:38 +02:00
|
|
|
# All modifications and additions to the file contributed by third parties
|
|
|
|
# remain the property of their copyright owners, unless otherwise agreed
|
|
|
|
# upon. The license for this file, and modifications and additions to the
|
|
|
|
# file, is the same license as for the pristine package itself (unless the
|
|
|
|
# license for the pristine package is not an Open Source License, in which
|
|
|
|
# case the license is the MIT License). An "Open Source License" is a
|
|
|
|
# license that conforms to the Open Source Definition (Version 1.9)
|
|
|
|
# published by the Open Source Initiative.
|
|
|
|
|
2019-05-29 17:28:27 +02:00
|
|
|
# Please submit bugfixes or comments via https://bugs.opensuse.org/
|
2007-01-16 00:12:14 +01:00
|
|
|
#
|
|
|
|
|
2012-07-04 11:07:32 +02:00
|
|
|
|
2017-11-24 08:06:33 +01:00
|
|
|
#Compat macro for new _fillupdir macro introduced in Nov 2017
|
|
|
|
%if ! %{defined _fillupdir}
|
2020-09-07 12:39:44 +02:00
|
|
|
%define _fillupdir %{_localstatedir}/adm/fillup-templates
|
2017-11-24 08:06:33 +01:00
|
|
|
%endif
|
2007-01-16 00:12:14 +01:00
|
|
|
Name: fetchmail
|
Accepting request 923570 from home:pmonrealgonzalez:branches:server:mail
- Update to 6.4.22: [bsc#1190069, CVE-2021-39272]
* OPENSSL AND LICENSING NOTE:
- fetchmail 6.4.22 is compatible with OpenSSL 1.1.1 and 3.0.0.
OpenSSL's licensing changed between these releases from dual
OpenSSL/SSLeay license to Apache License v2.0, which is
considered incompatible with GPL v2 by the FSF. For
implications and details, see the file COPYING.
* SECURITY FIXES:
- CVE-2021-39272: fetchmail-SA-2021-02: On IMAP connections,
without --ssl and with nonempty --sslproto, meaning that
fetchmail is to enforce TLS, and when the server or an attacker
sends a PREAUTH greeting, fetchmail used to continue an
unencrypted connection. Now, log the error and abort the
connection. --Recommendation for servers that support
SSL/TLS-wrapped or "implicit" mode on a dedicated port
(default 993): use --ssl, or the ssl user option in an rcfile.
- On IMAP and POP3 connections, --auth ssh no longer prevents
STARTTLS negotiation.
- On IMAP connections, fetchmail does not permit overriding
a server-side LOGINDISABLED with --auth password any more.
- On POP3 connections, the possibility for RPA authentication
(by probing with an AUTH command without arguments) no longer
prevents STARTTLS negotiation.
- For POP3 connections, only attempt RPA if the authentication
type is "any".
* BUG FIXES:
- On IMAP connections, when AUTHENTICATE EXTERNAL fails and we
have received the tagged (= final) response, do not send "*".
- On IMAP connections, AUTHENTICATE EXTERNAL without username
will properly send a "=" for protocol compliance.
OBS-URL: https://build.opensuse.org/request/show/923570
OBS-URL: https://build.opensuse.org/package/show/server:mail/fetchmail?expand=0&rev=120
2021-10-12 11:48:34 +02:00
|
|
|
Version: 6.4.22
|
2011-12-02 20:02:08 +01:00
|
|
|
Release: 0
|
2011-06-06 16:30:41 +02:00
|
|
|
Summary: Full-Featured POP and IMAP Mail Retrieval Daemon
|
2018-03-15 19:05:44 +01:00
|
|
|
License: GPL-2.0-or-later
|
2020-08-27 18:26:56 +02:00
|
|
|
URL: https://www.fetchmail.info/
|
2021-06-04 14:09:36 +02:00
|
|
|
#Source: fetchmail-7.0.0-alpha8.tar.xz
|
|
|
|
Source0: https://sourceforge.net/projects/%{name}/files/branch_6.4/%{name}-%{version}.tar.xz
|
2020-08-27 18:26:56 +02:00
|
|
|
Source1: https://sourceforge.net/projects/%{name}/files/branch_6.4/%{name}-%{version}.tar.xz.asc
|
2007-01-16 00:12:14 +01:00
|
|
|
Source2: %{name}.logrotate
|
|
|
|
Source3: sysconfig.%{name}
|
2013-04-29 16:07:31 +02:00
|
|
|
Source5: %{name}.keyring
|
2013-11-10 11:08:03 +01:00
|
|
|
Source6: %{name}.service
|
|
|
|
Source7: %{name}.tmpfiles
|
2016-04-08 14:39:15 +02:00
|
|
|
Source8: %{name}.exec
|
2020-12-21 13:04:39 +01:00
|
|
|
Source9: %{name}.sysusers
|
2021-06-04 14:09:36 +02:00
|
|
|
|
2009-08-10 17:49:38 +02:00
|
|
|
Patch0: fetchmail-6.3.8-smtp_errors.patch
|
2021-06-04 14:09:36 +02:00
|
|
|
Patch1: fetchmail-add-imap-oauthbearer-support.patch
|
|
|
|
Patch2: fetchmail-support-oauthbearer-xoauth2-with-pop3.patch
|
|
|
|
Patch3: fetchmail-add-passwordfile-and-passwordfd-options.patch
|
|
|
|
Patch4: fetchmail-add-contrib-fetchnmail-oauth2.py-token-acquisition-u.patch
|
|
|
|
Patch5: fetchmail-FAQ-list-gmail-options-including-oauthbearer-and-app.patch
|
|
|
|
Patch6: fetchmail-give-each-ctl-it-s-own-copy-of-password.patch
|
|
|
|
Patch7: fetchmail-re-read-passwordfile-on-every-poll.patch
|
|
|
|
Patch8: fetchmail-add-query_to64_outsize-utility-function.patch
|
|
|
|
Patch9: fetchmail-chase-and-integrate-interface-change.patch
|
|
|
|
Patch10: fetchmail-oauth2-c-calculate-and-pass-in-correct-buffer-size-to-to64frombits.patch
|
|
|
|
Patch11: fetchmail-increase-max-password-length-to-handle-oauth-tokens.patch
|
|
|
|
Patch12: fetchmail-bump-max-passwordlen-to-1bytes.patch
|
|
|
|
Patch13: fetchmail-add-readme-oauth2-issue-27.patch
|
2021-11-10 12:44:44 +01:00
|
|
|
Patch14: fetchmail-bison-3.8.patch
|
2015-01-08 17:05:27 +01:00
|
|
|
BuildRequires: automake
|
2021-06-04 14:09:36 +02:00
|
|
|
BuildRequires: bison
|
|
|
|
BuildRequires: flex
|
2015-01-08 17:05:27 +01:00
|
|
|
BuildRequires: krb5-devel
|
|
|
|
BuildRequires: openssl-devel
|
|
|
|
BuildRequires: opie
|
|
|
|
BuildRequires: postfix
|
|
|
|
BuildRequires: procmail
|
2020-01-08 17:49:32 +01:00
|
|
|
BuildRequires: python3-base
|
2020-02-02 15:08:06 +01:00
|
|
|
BuildRequires: shadow
|
2016-04-08 15:44:59 +02:00
|
|
|
BuildRequires: systemd-rpm-macros
|
2020-12-21 13:04:39 +01:00
|
|
|
BuildRequires: sysuser-shadow
|
|
|
|
BuildRequires: sysuser-tools
|
2015-01-08 17:05:27 +01:00
|
|
|
BuildRequires: xz
|
|
|
|
Requires: logrotate
|
2013-11-10 11:08:03 +01:00
|
|
|
Requires(pre): %fillup_prereq
|
2012-07-04 11:07:32 +02:00
|
|
|
Suggests: smtp_daemon
|
2020-12-21 13:04:39 +01:00
|
|
|
%sysusers_requires
|
2007-01-16 00:12:14 +01:00
|
|
|
|
|
|
|
%description
|
|
|
|
Fetchmail is a robust and well-documented remote mail retrieval and
|
|
|
|
forwarding utility intended to be used over on-demand TCP/IP links
|
|
|
|
(such as SLIP or PPP connections).
|
|
|
|
|
|
|
|
Fetchmail retrieves mail from remote mail servers and forwards it to
|
|
|
|
your local machine's delivery system, so it can be read by normal mail
|
|
|
|
user agents, such as mutt, elm, pine, (x)emacs/gnus, or mailx.
|
|
|
|
|
|
|
|
fetchmailconf, an interactive GUI configurator suitable for end-users,
|
|
|
|
is included in the fetchmailconf package.
|
|
|
|
|
|
|
|
%package -n fetchmailconf
|
|
|
|
Summary: Fetchmail Configuration Utility
|
2011-06-06 16:30:41 +02:00
|
|
|
Requires: %{name} = %{version}
|
2020-08-27 18:26:56 +02:00
|
|
|
Requires: python3-future
|
2020-01-08 17:49:32 +01:00
|
|
|
Requires: python3-tk
|
2007-01-16 00:12:14 +01:00
|
|
|
|
|
|
|
%description -n fetchmailconf
|
|
|
|
A GUI configuration utility for generating fetchmail configuration
|
|
|
|
files (.fetchmailrc).
|
|
|
|
|
|
|
|
%prep
|
2015-01-08 17:05:27 +01:00
|
|
|
%setup -q
|
2009-08-10 17:49:38 +02:00
|
|
|
%patch0 -p1
|
2021-06-04 14:09:36 +02:00
|
|
|
%patch1 -p1
|
|
|
|
%patch2 -p1
|
|
|
|
%patch3 -p1
|
|
|
|
%patch4 -p1
|
|
|
|
%patch5 -p1
|
|
|
|
%patch6 -p1
|
|
|
|
%patch7 -p1
|
|
|
|
%patch8 -p1
|
|
|
|
%patch9 -p1
|
|
|
|
%patch10 -p1
|
|
|
|
%patch11 -p1
|
|
|
|
%patch12 -p1
|
|
|
|
%patch13 -p1
|
2021-11-10 12:44:44 +01:00
|
|
|
%patch14 -p1
|
2015-01-08 17:05:27 +01:00
|
|
|
cp -a %{SOURCE2} %{SOURCE3} .
|
|
|
|
|
|
|
|
ACLOCAL="aclocal -I m4 -I m4-local" autoreconf -fvi
|
2007-01-16 00:12:14 +01:00
|
|
|
|
|
|
|
%build
|
2015-01-08 17:05:27 +01:00
|
|
|
export CFLAGS="%{optflags} -fPIE"
|
|
|
|
%configure \
|
2021-03-03 18:31:48 +01:00
|
|
|
--enable-POP2 \
|
|
|
|
--enable-RPA \
|
|
|
|
--enable-NTLM \
|
|
|
|
--enable-SDPS \
|
|
|
|
--enable-opie \
|
|
|
|
--with-kerberos5 \
|
|
|
|
--with-gssapi \
|
|
|
|
--with-ssl=%{_prefix}
|
2020-09-07 12:39:44 +02:00
|
|
|
%make_build LDFLAGS="-pie"
|
2020-12-21 13:04:39 +01:00
|
|
|
%sysusers_generate_pre %{SOURCE9} fetchmail
|
2007-01-16 00:12:14 +01:00
|
|
|
|
|
|
|
%install
|
2011-06-06 16:30:41 +02:00
|
|
|
%make_install
|
2020-09-01 16:44:01 +02:00
|
|
|
ln -sf fetchmail.1.gz %{buildroot}%{_mandir}/man1/fetchmailconf.1.gz
|
2011-06-06 16:30:41 +02:00
|
|
|
mkdir -p %{buildroot}%{_sysconfdir}/logrotate.d
|
|
|
|
cp fetchmail.logrotate %{buildroot}%{_sysconfdir}/logrotate.d/fetchmail
|
|
|
|
mkdir -p %{buildroot}/sbin
|
2020-09-01 16:44:01 +02:00
|
|
|
mkdir -p %{buildroot}%{_unitdir}
|
|
|
|
mkdir -p %{buildroot}%{_tmpfilesdir}
|
2020-12-21 13:04:39 +01:00
|
|
|
mkdir -p %{buildroot}%{_sysusersdir}
|
2020-09-01 16:44:01 +02:00
|
|
|
sed -e 's-@LIBEXECDIR@-%{_libexecdir}-g' -i %{SOURCE6}
|
|
|
|
install -m 0644 %{SOURCE6} %{buildroot}%{_unitdir}/%{name}.service
|
|
|
|
install -m 0644 %{SOURCE7} %{buildroot}%{_tmpfilesdir}/%{name}.conf
|
2020-12-21 13:04:39 +01:00
|
|
|
install -m 0644 %{SOURCE9} %{buildroot}%{_sysusersdir}/%{name}.conf
|
2020-09-01 16:44:01 +02:00
|
|
|
mkdir -p %{buildroot}%{_libexecdir}
|
|
|
|
install -m 0755 %{SOURCE8} %{buildroot}%{_libexecdir}/%{name}-systemd-exec
|
2015-01-08 17:05:27 +01:00
|
|
|
mkdir -p %{buildroot}%{_sbindir}
|
|
|
|
ln -s service %{buildroot}%{_sbindir}/rc%{name}
|
2011-06-06 16:30:41 +02:00
|
|
|
touch %{buildroot}%{_sysconfdir}/fetchmailrc
|
2017-11-24 08:06:33 +01:00
|
|
|
mkdir -p %{buildroot}%{_fillupdir}
|
|
|
|
cp sysconfig.%{name} %{buildroot}%{_fillupdir}
|
2011-06-06 16:30:41 +02:00
|
|
|
mkdir -p %{buildroot}%{_localstatedir}/log
|
|
|
|
touch %{buildroot}%{_localstatedir}/log/fetchmail
|
|
|
|
mkdir -p %{buildroot}%{_localstatedir}/lib/fetchmail
|
Accepting request 159960 from home:vitezslav_cizek:branches:server:mail
- update to 6.3,25
# CRITICAL AND REGRESSION FIXES
* Plug a memory leak in OpenSSL's certificate verification callback.
This would affect fetchmail configurations running with SSL in daemon mode
more than one-shot runs.
Reported by Erik Thiele, and pinned by Dominik Heeg,
fixes Debian Bug #688015.
This bug was introduced into fetchmail 6.3.0 (committed 2005-10-29)
when support for subjectAltName was added through a patch by Roland
Stigge, submitted as Debian Bug#201113.
* The --logfile option now works again outside daemon mode, reported by Heinz
Diehl. The documentation that I had been reading was inconsistent with the
code, and only parts of the manual page claimed that --logfile was only
effective in daemon mode.
# BUG FIXES
* Fix a memory leak in out-of-memory error condition while handling plugins.
Report and patch by John Beck (found with Parfait static code analyzer).
* Fix a NULL pointer dereference in out-of-memory error condition while handling
plugins.
Report and patch by John Beck (found with Parfait static code analyzer).
# CHANGES
* Improved reporting when SSL/TLS X.509 certificate validation has failed,
working around a not-so-recent swapping of two OpenSSL error codes, and
a practical impossibility to distinguish broken certification chains from
missing trust anchors (root certificates).
* OpenSSL decoded errors are now reported through report(), rather than dumped
to stderr, so that they should show up in logfiles and/or syslog.
* The fetchmail manual page no longer claims that MD5 were the default OpenSSL
hash format (for use with --sslfingerprint). Reported by Jakob Wilk,
PARTIAL fix for Debian Bug#700266.
OBS-URL: https://build.opensuse.org/request/show/159960
OBS-URL: https://build.opensuse.org/package/show/server:mail/fetchmail?expand=0&rev=48
2013-03-19 13:38:13 +01:00
|
|
|
# we don't need this, it's aimed at fetchmail developers
|
|
|
|
# and rpmlint is complaining that we have a binary in /usr/share
|
|
|
|
rm -r contrib/gai*
|
2007-01-25 17:56:01 +01:00
|
|
|
%find_lang %{name}
|
2007-01-16 00:12:14 +01:00
|
|
|
|
2020-12-21 13:04:39 +01:00
|
|
|
%pre -f fetchmail.pre
|
2016-05-17 17:37:52 +02:00
|
|
|
%service_add_pre %{name}.service
|
2007-01-16 00:12:14 +01:00
|
|
|
|
|
|
|
%post
|
2015-01-08 17:05:27 +01:00
|
|
|
%fillup_only
|
2020-12-21 13:04:39 +01:00
|
|
|
%tmpfiles_create %{name}.conf
|
2013-11-10 11:08:03 +01:00
|
|
|
%service_add_post %{name}.service
|
2007-01-16 00:12:14 +01:00
|
|
|
|
2014-05-21 14:22:56 +02:00
|
|
|
%preun
|
2015-01-08 17:05:27 +01:00
|
|
|
%service_del_preun %{name}.service
|
2014-05-21 14:22:56 +02:00
|
|
|
|
2007-01-16 00:12:14 +01:00
|
|
|
%postun
|
2013-11-10 11:08:03 +01:00
|
|
|
%service_del_postun %{name}.service
|
2007-01-16 00:12:14 +01:00
|
|
|
|
Accepting request 737166 from home:pmonrealgonzalez:branches:server:mail
- Update to 6.4.1 [bsc#1152964]
## REGRESSION FIXES:
* The bug fix Debian Bug#941129 was incomplete and caused
- a regression in the default file locations, so that fetchmail was
no longer able to find its configuration files in some situations.
- a regression under _FORTIFY_SOURCE where PATH_MAX > minimal _POSIX_PATH_MAX.
- Update to 6.4.0
## SECURITY FIXES THAT AFFECT BEHAVIOUR AND MAY REQUIRE RECONFIGURATION
* Fetchmail no longer supports SSLv2.
* Fetchmail no longer attempts to negotiate SSLv3 by default,
even with --sslproto ssl23. Fetchmail can now use SSLv3, or TLSv1.1 or a newer
TLS version, with STLS/STARTTLS (it would previously force TLSv1.0 with
STARTTLS). If the OpenSSL version used at build and run-time supports these
versions, --sslproto ssl3 and --sslproto ssl3+ can be used to re-enable SSLv3.
Doing so is discouraged because the SSLv3 protocol is broken.
While this change is supposed to be compatible with common configurations,
users may have to and are advised to change all explicit --sslproto ssl2
(change to newer protocols required), --sslproto ssl3, --sslproto tls1 to
--sslproto auto, so that they can benefit from TLSv1.1 and TLSv1.2 where
supported by the server.
The --sslproto option now understands the values auto, ssl3+, tls1+, tls1.1,
tls1.1+, tls1.2, tls1.2+, tls1.3, tls1.3+ (case insensitively), see CHANGES
below for details.
* Fetchmail defaults to --sslcertck behaviour. A new option --nosslcertck to
override this has been added, but may be removed in future fetchmail versions
in favour of another configuration option that makes the insecurity in using
this option clearer.
## SECURITY FIXES
* Fetchmail prevents buffer overruns in GSSAPI authentication with user names
beyond c. 6000 characters in length. Reported by Greg Hudson.
OBS-URL: https://build.opensuse.org/request/show/737166
OBS-URL: https://build.opensuse.org/package/show/server:mail/fetchmail?expand=0&rev=88
2019-10-10 19:30:47 +02:00
|
|
|
%check
|
2020-09-07 12:39:44 +02:00
|
|
|
%make_build check
|
Accepting request 737166 from home:pmonrealgonzalez:branches:server:mail
- Update to 6.4.1 [bsc#1152964]
## REGRESSION FIXES:
* The bug fix Debian Bug#941129 was incomplete and caused
- a regression in the default file locations, so that fetchmail was
no longer able to find its configuration files in some situations.
- a regression under _FORTIFY_SOURCE where PATH_MAX > minimal _POSIX_PATH_MAX.
- Update to 6.4.0
## SECURITY FIXES THAT AFFECT BEHAVIOUR AND MAY REQUIRE RECONFIGURATION
* Fetchmail no longer supports SSLv2.
* Fetchmail no longer attempts to negotiate SSLv3 by default,
even with --sslproto ssl23. Fetchmail can now use SSLv3, or TLSv1.1 or a newer
TLS version, with STLS/STARTTLS (it would previously force TLSv1.0 with
STARTTLS). If the OpenSSL version used at build and run-time supports these
versions, --sslproto ssl3 and --sslproto ssl3+ can be used to re-enable SSLv3.
Doing so is discouraged because the SSLv3 protocol is broken.
While this change is supposed to be compatible with common configurations,
users may have to and are advised to change all explicit --sslproto ssl2
(change to newer protocols required), --sslproto ssl3, --sslproto tls1 to
--sslproto auto, so that they can benefit from TLSv1.1 and TLSv1.2 where
supported by the server.
The --sslproto option now understands the values auto, ssl3+, tls1+, tls1.1,
tls1.1+, tls1.2, tls1.2+, tls1.3, tls1.3+ (case insensitively), see CHANGES
below for details.
* Fetchmail defaults to --sslcertck behaviour. A new option --nosslcertck to
override this has been added, but may be removed in future fetchmail versions
in favour of another configuration option that makes the insecurity in using
this option clearer.
## SECURITY FIXES
* Fetchmail prevents buffer overruns in GSSAPI authentication with user names
beyond c. 6000 characters in length. Reported by Greg Hudson.
OBS-URL: https://build.opensuse.org/request/show/737166
OBS-URL: https://build.opensuse.org/package/show/server:mail/fetchmail?expand=0&rev=88
2019-10-10 19:30:47 +02:00
|
|
|
|
2007-01-25 17:56:01 +01:00
|
|
|
%files -f %{name}.lang
|
Accepting request 737166 from home:pmonrealgonzalez:branches:server:mail
- Update to 6.4.1 [bsc#1152964]
## REGRESSION FIXES:
* The bug fix Debian Bug#941129 was incomplete and caused
- a regression in the default file locations, so that fetchmail was
no longer able to find its configuration files in some situations.
- a regression under _FORTIFY_SOURCE where PATH_MAX > minimal _POSIX_PATH_MAX.
- Update to 6.4.0
## SECURITY FIXES THAT AFFECT BEHAVIOUR AND MAY REQUIRE RECONFIGURATION
* Fetchmail no longer supports SSLv2.
* Fetchmail no longer attempts to negotiate SSLv3 by default,
even with --sslproto ssl23. Fetchmail can now use SSLv3, or TLSv1.1 or a newer
TLS version, with STLS/STARTTLS (it would previously force TLSv1.0 with
STARTTLS). If the OpenSSL version used at build and run-time supports these
versions, --sslproto ssl3 and --sslproto ssl3+ can be used to re-enable SSLv3.
Doing so is discouraged because the SSLv3 protocol is broken.
While this change is supposed to be compatible with common configurations,
users may have to and are advised to change all explicit --sslproto ssl2
(change to newer protocols required), --sslproto ssl3, --sslproto tls1 to
--sslproto auto, so that they can benefit from TLSv1.1 and TLSv1.2 where
supported by the server.
The --sslproto option now understands the values auto, ssl3+, tls1+, tls1.1,
tls1.1+, tls1.2, tls1.2+, tls1.3, tls1.3+ (case insensitively), see CHANGES
below for details.
* Fetchmail defaults to --sslcertck behaviour. A new option --nosslcertck to
override this has been added, but may be removed in future fetchmail versions
in favour of another configuration option that makes the insecurity in using
this option clearer.
## SECURITY FIXES
* Fetchmail prevents buffer overruns in GSSAPI authentication with user names
beyond c. 6000 characters in length. Reported by Greg Hudson.
OBS-URL: https://build.opensuse.org/request/show/737166
OBS-URL: https://build.opensuse.org/package/show/server:mail/fetchmail?expand=0&rev=88
2019-10-10 19:30:47 +02:00
|
|
|
%license COPYING
|
2021-06-04 14:09:36 +02:00
|
|
|
%doc FAQ FEATURES NEWS NOTES OLDNEWS README README.NTLM README.OAUTH2 README.SSL README.SSL-SERVER TODO contrib *.html *.txt *.pdf
|
2007-01-25 17:56:01 +01:00
|
|
|
%{_bindir}/fetchmail
|
2020-12-21 13:04:39 +01:00
|
|
|
%dir %attr(0700, fetchmail, fetchmail) %{_localstatedir}/lib/fetchmail
|
2011-06-06 16:30:41 +02:00
|
|
|
%ghost %attr(0600, fetchmail, root) %{_localstatedir}/log/fetchmail
|
2020-09-07 12:39:44 +02:00
|
|
|
%{_mandir}/man1/fetchmail.1%{?ext_man}
|
2011-06-06 16:30:41 +02:00
|
|
|
%ghost %config(noreplace) %attr(0600, fetchmail, root) %{_sysconfdir}/fetchmailrc
|
|
|
|
%config(noreplace) %{_sysconfdir}/logrotate.d/fetchmail
|
2013-11-10 11:08:03 +01:00
|
|
|
%{_unitdir}/%{name}.service
|
2015-01-08 17:05:27 +01:00
|
|
|
%{_sbindir}/rc%{name}
|
2020-09-01 16:44:01 +02:00
|
|
|
%{_libexecdir}/%{name}-systemd-exec
|
2020-08-19 10:50:17 +02:00
|
|
|
%{_tmpfilesdir}/%{name}.conf
|
2020-12-21 13:04:39 +01:00
|
|
|
%{_sysusersdir}/%{name}.conf
|
2017-11-24 08:06:33 +01:00
|
|
|
%{_fillupdir}/sysconfig.%{name}
|
2007-01-16 00:12:14 +01:00
|
|
|
|
|
|
|
%files -n fetchmailconf
|
2007-01-25 17:56:01 +01:00
|
|
|
%{_bindir}/fetchmailconf
|
2020-09-07 12:39:44 +02:00
|
|
|
%{_mandir}/man1/fetchmailconf.1%{?ext_man}
|
2020-01-08 17:49:32 +01:00
|
|
|
%{python3_sitelib}/fetchmailconf.*
|
|
|
|
%{python3_sitelib}/__pycache__/fetchmailconf*
|
2007-11-29 00:01:50 +01:00
|
|
|
|
2007-03-30 02:33:07 +02:00
|
|
|
%changelog
|