update to 3.20240206 [release 3.20240206-1mamba;Mon Apr 22 2024]
This commit is contained in:
parent
890ac20004
commit
65829a4c78
@ -1,17 +0,0 @@
|
|||||||
https://rt.cpan.org/Public/Bug/Display.html?id=86060
|
|
||||||
|
|
||||||
--- lib/Mail/SPF/Util.pm
|
|
||||||
+++ lib/Mail/SPF/Util.pm
|
|
||||||
@@ -155,9 +155,9 @@ sub ipv6_address_is_ipv4_mapped {
|
|
||||||
throws I<Mail::SPF::EInvalidOptionValue>
|
|
||||||
|
|
||||||
Returns the given I<NetAddr::IP> IPv4 or IPv6 address compactly formatted as a
|
|
||||||
-I<string>. For IPv4 addresses, this is equivalent to calling L< NetAddr::IP's
|
|
||||||
-C<addr> |NetAddr::IP/addr> method. For IPv6 addresses, this is equivalent to
|
|
||||||
-calling L< NetAddr::IP's C<short> |NedAddr::IP/short> method. Throws a
|
|
||||||
+I<string>. For IPv4 addresses, this is equivalent to calling L<NetAddr::IP's
|
|
||||||
+C<addr>|NetAddr::IP/addr> method. For IPv6 addresses, this is equivalent to
|
|
||||||
+calling L<NetAddr::IP's C<short>|NetAddr::IP/short> method. Throws a
|
|
||||||
I<Mail::SPF::EInvalidOptionValue> exception if the specified object is not a
|
|
||||||
I<NetAddr::IP> IPv4 or IPv6 address object.
|
|
||||||
|
|
@ -1,62 +0,0 @@
|
|||||||
Drop tests that fail with Net::DNS ≥ 0.68 due to that module's
|
|
||||||
sanitization of domain names
|
|
||||||
|
|
||||||
https://rt.cpan.org/Ticket/Display.html?id=78214
|
|
||||||
|
|
||||||
--- t/rfc4408-tests.yml
|
|
||||||
+++ t/rfc4408-tests.yml
|
|
||||||
@@ -20,16 +20,6 @@
|
|
||||||
---
|
|
||||||
description: Initial processing
|
|
||||||
tests:
|
|
||||||
- toolonglabel:
|
|
||||||
- description: >-
|
|
||||||
- DNS labels limited to 63 chars.
|
|
||||||
- comment: >-
|
|
||||||
- For initial processing, a long label results in None, not TempError
|
|
||||||
- spec: 4.3/1
|
|
||||||
- helo: mail.example.net
|
|
||||||
- host: 1.2.3.5
|
|
||||||
- mailfrom: lyme.eater@A123456789012345678901234567890123456789012345678901234567890123.example.com
|
|
||||||
- result: none
|
|
||||||
longlabel:
|
|
||||||
description: >-
|
|
||||||
DNS labels limited to 63 chars.
|
|
||||||
@@ -360,21 +350,6 @@ tests:
|
|
||||||
host: 1.2.3.4
|
|
||||||
mailfrom: foo@t9.example.com
|
|
||||||
result: permerror
|
|
||||||
- invalid-domain-empty-label:
|
|
||||||
- description: >-
|
|
||||||
- target-name that is a valid domain-spec per RFC 4408 but an invalid
|
|
||||||
- domain name per RFC 1035 (empty label) must be treated as non-existent.
|
|
||||||
- comment: >-
|
|
||||||
- An empty domain label, i.e. two successive dots, in a mechanism
|
|
||||||
- target-name is valid domain-spec syntax, even though a DNS query cannot
|
|
||||||
- be composed from it. The spec being unclear about it, this could either
|
|
||||||
- be considered a syntax error, or, by analogy to 4.3/1 and 5/10/3, the
|
|
||||||
- mechanism chould be treated as a no-match.
|
|
||||||
- spec: [4.3/1, 5/10/3]
|
|
||||||
- helo: mail.example.com
|
|
||||||
- host: 1.2.3.4
|
|
||||||
- mailfrom: foo@t10.example.com
|
|
||||||
- result: [permerror, fail]
|
|
||||||
invalid-domain-long:
|
|
||||||
description: >-
|
|
||||||
target-name that is a valid domain-spec per RFC 4408 but an invalid
|
|
||||||
@@ -1776,15 +1751,6 @@ tests:
|
|
||||||
host: 192.168.218.40
|
|
||||||
mailfrom: test@e1.example.com
|
|
||||||
result: permerror
|
|
||||||
- macro-mania-in-domain:
|
|
||||||
- description: >-
|
|
||||||
- macro-encoded percents (%%), spaces (%_), and URL-percent-encoded
|
|
||||||
- spaces (%-)
|
|
||||||
- spec: 8.1/3, 8.1/4
|
|
||||||
- helo: mail.example.com
|
|
||||||
- host: 1.2.3.4
|
|
||||||
- mailfrom: test@e1a.example.com
|
|
||||||
- result: pass
|
|
||||||
exp-txt-macro-char:
|
|
||||||
spec: 8.1/20
|
|
||||||
description: >-
|
|
@ -2,17 +2,15 @@
|
|||||||
%define perl_ver %(eval `perl -V:version`; echo ${version})
|
%define perl_ver %(eval `perl -V:version`; echo ${version})
|
||||||
|
|
||||||
Name: perl-Mail-SPF
|
Name: perl-Mail-SPF
|
||||||
Version: 2.9.0
|
Version: 3.20240206
|
||||||
Release: 3mamba
|
Release: 1mamba
|
||||||
Summary: Mail::SPF - An object-oriented implementation of Sender Policy Framework
|
Summary: Mail::SPF - An object-oriented implementation of Sender Policy Framework
|
||||||
Group: System/Libraries/Perl
|
Group: System/Libraries/Perl
|
||||||
Vendor: openmamba
|
Vendor: openmamba
|
||||||
Distribution: openmamba
|
Distribution: openmamba
|
||||||
Packager: Silvan Calarco <silvan.calarco@mambasoft.it>
|
Packager: Silvan Calarco <silvan.calarco@mambasoft.it>
|
||||||
URL: https://www.cpan.org/
|
URL: https://www.cpan.org/
|
||||||
Source: http://search.cpan.org/CPAN/authors/id/J/JM/JMEHNLE/mail-spf/Mail-SPF-v%{version}.tar.gz
|
Source: https://cpan.metacpan.org/authors/id/M/MB/MBRADSHAW/Mail-SPF-%{version}.tar.gz
|
||||||
Patch0: perl-Mail-SPF-2.9.0-POD.patch
|
|
||||||
Patch1: perl-Mail-SPF-2.9.0-testsuite.patch
|
|
||||||
License: BSF
|
License: BSF
|
||||||
## AUTOBUILDREQ-BEGIN
|
## AUTOBUILDREQ-BEGIN
|
||||||
BuildRequires: libperl
|
BuildRequires: libperl
|
||||||
@ -34,10 +32,7 @@ Requires: perl >= %perl_major_ver
|
|||||||
Mail::SPF - An object-oriented implementation of Sender Policy Framework
|
Mail::SPF - An object-oriented implementation of Sender Policy Framework
|
||||||
|
|
||||||
%prep
|
%prep
|
||||||
%setup -q -n Mail-SPF-v%{version}
|
%setup -q -n Mail-SPF-%{version}
|
||||||
%patch 0 -p0
|
|
||||||
%patch 1 -p0
|
|
||||||
chmod -x bin/* sbin/*
|
|
||||||
|
|
||||||
%build
|
%build
|
||||||
perl Makefile.PL PREFIX=%{_prefix} INSTALLDIRS=vendor
|
perl Makefile.PL PREFIX=%{_prefix} INSTALLDIRS=vendor
|
||||||
@ -69,6 +64,9 @@ rm -f .packlist
|
|||||||
%defattr(-,root,root)
|
%defattr(-,root,root)
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Apr 22 2024 Silvan Calarco <silvan.calarco@mambasoft.it> 3.20240206-1mamba
|
||||||
|
- update to 3.20240206
|
||||||
|
|
||||||
* Mon Apr 17 2023 Sdk Build System <sdk@mambasoft.it> 2.9.0-3mamba
|
* Mon Apr 17 2023 Sdk Build System <sdk@mambasoft.it> 2.9.0-3mamba
|
||||||
- rebuilt with perl 5.36.0
|
- rebuilt with perl 5.36.0
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user