Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package postfix for openSUSE:Factory checked 
in at 2021-07-29 21:31:10
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/postfix (Old)
 and      /work/SRC/openSUSE:Factory/.postfix.new.1899 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "postfix"

Thu Jul 29 21:31:10 2021 rev:206 rq:908570 version:3.6.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/postfix/postfix-bdb.changes      2021-07-09 
23:56:55.929647654 +0200
+++ /work/SRC/openSUSE:Factory/.postfix.new.1899/postfix-bdb.changes    
2021-07-29 21:31:44.384787634 +0200
@@ -1,0 +2,66 @@
+Mon Jul 26 19:59:12 UTC 2021 - Peter Varkoly <vark...@suse.com>
+
+- Syntax error in config.postfix
+  (bsc#1188477) 
+
+-------------------------------------------------------------------
+Sun Jul 25 23:22:23 UTC 2021 - Michael Str??der <mich...@stroeder.com>
+
+- Update to 3.6.2
+  * In Postfix 3.6, fixed a false "Result too large" (ERANGE) fatal
+    error in the compatibility_level parser, because there was no
+    'errno = 0' statement before an strtol() call.
+  * (problem introduced in Postfix 3.3) "Null pointer read" error
+    in the cleanup daemon when "header_from_format = standard" (the
+    default as of Postfix 3.3), and email was submitted with
+    /usr/sbin/sendmail without From: header, and an all-space full
+    name was specified in 1) the password file, 2) with "sendmail
+    -F", or 3) with the NAME environment variable. Found by Renaud
+    Metrich.
+  * (problem introduced in Postfix 2.4) False "too many reverse
+    jump" warnings in the showq daemon, because loop detection code
+    was comparing memory addresses instead of queue file names.
+    Reported by Mehmet Avcioglu.
+  * (problem introduced in 1999) The Postfix SMTP server was sending
+    all session transcripts to the error_notice_recipient (default:
+    postmaster), instead of sending transcripts of bounced mail to
+    the bounce_notice_recipient (default: postmaster). Reported by
+    Hans van Zijst.
+  * The texthash: map implementation broke tls_server_sni_maps,
+    because it did not support multi-file inputs. Reported by
+    Christopher Gurnee, who also found an instance of the missing
+    code in the "postmap -F" source code. File: util/dict_thash.c.
+
+-------------------------------------------------------------------
+Wed Jul 14 14:37:24 UTC 2021 - Peter Varkoly <vark...@suse.com>
+
+- spamd wants to start before mail-transfer-agent.target, but that target 
doesn't exist
+  (bsc#1066854) 
+
+-------------------------------------------------------------------
+Tue Jul  6 22:23:17 UTC 2021 - Christian Wittmer <ch...@computersalat.de>
+
+- postfix-SUSE
+  * rework sysconfig.postfix, add
+    - POSTFIX_WITH_DKIM
+    - POSTFIX_DKIM_CONN
+  * rework config.postfix for main.cf
+    - with_dkim
+- update postfix-main.cf.patch
+  * add OpenDKIM settings
+
+-------------------------------------------------------------------
+Wed Jun 23 22:28:52 UTC 2021 - Christian Wittmer <ch...@computersalat.de>
+
+- postfix-mysql
+  * add mysql_relay_recipient_maps.cf
+- postfix-SUSE
+  * rework sysconfig.postfix, add
+    - POSTFIX_RELAY_RECIPIENTS
+    - POSTFIX_BACKUPMX
+  * add relay_recipients
+  * rework config.postfix for main.cf
+    - is_backupmx
+    - relay_recipient_maps
+
+-------------------------------------------------------------------
@@ -18,0 +85,9 @@
+
+-------------------------------------------------------------------
+Sun Jun  6 12:51:35 UTC 2021 - Christian Wittmer <ch...@computersalat.de>
+
+- fix postfix-master.cf.patch
+  * set correct indentation (again) for options of
+    - submission (needs 3 spaces)
+    - smtps (needs 4 spaces)
+    to make config.postfix work nicely again
--- /work/SRC/openSUSE:Factory/postfix/postfix.changes  2021-07-22 
22:42:41.215252477 +0200
+++ /work/SRC/openSUSE:Factory/.postfix.new.1899/postfix.changes        
2021-07-29 21:31:44.416787595 +0200
@@ -1,0 +2,34 @@
+Mon Jul 26 19:59:12 UTC 2021 - Peter Varkoly <vark...@suse.com>
+
+- Syntax error in config.postfix
+  (bsc#1188477) 
+
+-------------------------------------------------------------------
+Sun Jul 25 23:22:23 UTC 2021 - Michael Str??der <mich...@stroeder.com>
+
+- Update to 3.6.2
+  * In Postfix 3.6, fixed a false "Result too large" (ERANGE) fatal
+    error in the compatibility_level parser, because there was no
+    'errno = 0' statement before an strtol() call.
+  * (problem introduced in Postfix 3.3) "Null pointer read" error
+    in the cleanup daemon when "header_from_format = standard" (the
+    default as of Postfix 3.3), and email was submitted with
+    /usr/sbin/sendmail without From: header, and an all-space full
+    name was specified in 1) the password file, 2) with "sendmail
+    -F", or 3) with the NAME environment variable. Found by Renaud
+    Metrich.
+  * (problem introduced in Postfix 2.4) False "too many reverse
+    jump" warnings in the showq daemon, because loop detection code
+    was comparing memory addresses instead of queue file names.
+    Reported by Mehmet Avcioglu.
+  * (problem introduced in 1999) The Postfix SMTP server was sending
+    all session transcripts to the error_notice_recipient (default:
+    postmaster), instead of sending transcripts of bounced mail to
+    the bounce_notice_recipient (default: postmaster). Reported by
+    Hans van Zijst.
+  * The texthash: map implementation broke tls_server_sni_maps,
+    because it did not support multi-file inputs. Reported by
+    Christopher Gurnee, who also found an instance of the missing
+    code in the "postmap -F" source code. File: util/dict_thash.c.
+
+-------------------------------------------------------------------

Old:
----
  postfix-3.6.1.tar.gz
  postfix-3.6.1.tar.gz.asc

New:
----
  postfix-3.6.2.tar.gz
  postfix-3.6.2.tar.gz.asc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ postfix-bdb.spec ++++++
--- /var/tmp/diff_new_pack.OIbCBA/_old  2021-07-29 21:31:45.176786659 +0200
+++ /var/tmp/diff_new_pack.OIbCBA/_new  2021-07-29 21:31:45.176786659 +0200
@@ -56,7 +56,7 @@
 %endif
 %bcond_without ldap
 Name:           postfix-bdb
-Version: 3.6.1
+Version: 3.6.2
 Release:        0
 Summary:        A fast, secure, and flexible mailer
 License:        IPL-1.0 OR EPL-2.0

++++++ postfix.spec ++++++
--- /var/tmp/diff_new_pack.OIbCBA/_old  2021-07-29 21:31:45.204786625 +0200
+++ /var/tmp/diff_new_pack.OIbCBA/_new  2021-07-29 21:31:45.208786619 +0200
@@ -42,7 +42,7 @@
 %bcond_without libnsl
 %bcond_without ldap
 Name:           postfix
-Version:        3.6.1
+Version:        3.6.2
 Release:        0
 Summary:        A fast, secure, and flexible mailer
 License:        IPL-1.0 OR EPL-2.0

++++++ postfix-3.6.1.tar.gz -> postfix-3.6.2.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/postfix-3.6.1/HISTORY new/postfix-3.6.2/HISTORY
--- old/postfix-3.6.1/HISTORY   2021-06-13 20:47:56.000000000 +0200
+++ new/postfix-3.6.2/HISTORY   2021-07-25 00:41:41.000000000 +0200
@@ -25571,3 +25571,44 @@
 
        Typo (introduced: Postfix 3.4): silent_discard should be
        silent-discard. File: proto/BDAT_README.html.
+
+20210615
+
+       Bugfix (introduced: Postfix 3.4): the texthash: map
+       implementation did not support "postmap -F" behavior.
+       Reported by Christopher Gurnee, who also found the missing
+       code in the postmap source. File: util/dict_thash.c.
+
+20210623
+
+       Bugfix (introduced: Postfix 3.6) false "Result too large"
+       (ERANGE) fatal errors in the compatibility_level parser,
+       because an strtol() call had no 'errno = 0' statement before
+       the call. Also fixed two older latent bugs of the same kind.
+       Problem reported by David Bohman. Files: global/compat_level.c,
+       postscreen/postscreen_tests.c, util/mac_expand.c.
+
+20210705
+
+       Bugfix (introduced: Postfix 3.3): "null pointer read" error
+       in the cleanup daemon when "header_from_format = standard"
+       (the default as of Postfix 3.3) and email was submitted
+       with /usr/sbin/sendmail without From: header, and an all-space
+       full name was specified in 1) the password file, 2) with
+       "sendmail -F", or 3) with the NAME environment variable.
+       Found by Renaud Metrich. File: cleanup/cleanup_message.c.
+
+20210708
+
+       Bugfix (introduced: 1999): the Postfix SMTP server was
+       sending all session transcripts to the error_notice_recipient,
+       instead of sending transcripts of bounced mail to the
+       bounce_notice_recipient. File: smtpd/smtpd_chat.c.
+
+20210713
+
+       Bugfix (introduced: Postfix 2.4): false "too many reverse
+       jump" warnings in the showq daemon. The loop detection code
+       was comparing memory addresses instead of queue file names.
+       It now properly compares strings. Reported by Mehmet Avcioglu.
+       File: global/record.c.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/postfix-3.6.1/src/cleanup/cleanup_message.c 
new/postfix-3.6.2/src/cleanup/cleanup_message.c
--- old/postfix-3.6.1/src/cleanup/cleanup_message.c     2019-11-10 
00:23:23.000000000 +0100
+++ new/postfix-3.6.2/src/cleanup/cleanup_message.c     2021-07-08 
00:09:51.000000000 +0200
@@ -776,9 +776,12 @@
                } else {
                    token = tok822_alloc(TOK822_QSTRING, state->fullname);
                }
-               tok822_externalize(state->temp2, token, TOK822_STR_NONE);
-               tok822_free(token);
-               vstring_sprintf_append(state->temp2, " <%s>",
+               if (token) {
+                   tok822_externalize(state->temp2, token, TOK822_STR_NONE);
+                   tok822_free(token);
+                   vstring_strcat(state->temp2, " ");
+               }
+               vstring_sprintf_append(state->temp2, "<%s>",
                                       vstring_str(state->temp1));
                break;
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/postfix-3.6.1/src/global/compat_level.c 
new/postfix-3.6.2/src/global/compat_level.c
--- old/postfix-3.6.1/src/global/compat_level.c 2021-04-19 19:40:46.000000000 
+0200
+++ new/postfix-3.6.2/src/global/compat_level.c 2021-07-24 23:26:54.000000000 
+0200
@@ -157,6 +157,7 @@
     char   *remainder;
 
     start = str;
+    errno = 0;
     major = strtol(start, &remainder, 10);
     if (start < remainder && (*remainder == 0 || *remainder == '.')
        && errno != ERANGE && GOOD_MAJOR(major)) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/postfix-3.6.1/src/global/mail_version.h 
new/postfix-3.6.2/src/global/mail_version.h
--- old/postfix-3.6.1/src/global/mail_version.h 2021-06-13 20:50:57.000000000 
+0200
+++ new/postfix-3.6.2/src/global/mail_version.h 2021-07-25 01:16:27.000000000 
+0200
@@ -20,8 +20,8 @@
   * Patches change both the patchlevel and the release date. Snapshots have no
   * patchlevel; they change the release date only.
   */
-#define MAIL_RELEASE_DATE      "20210613"
-#define MAIL_VERSION_NUMBER    "3.6.1"
+#define MAIL_RELEASE_DATE      "20210724"
+#define MAIL_VERSION_NUMBER    "3.6.2"
 
 #ifdef SNAPSHOT
 #define MAIL_VERSION_DATE      "-" MAIL_RELEASE_DATE
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/postfix-3.6.1/src/global/record.c 
new/postfix-3.6.2/src/global/record.c
--- old/postfix-3.6.1/src/global/record.c       2021-01-14 00:54:42.000000000 
+0100
+++ new/postfix-3.6.2/src/global/record.c       2021-07-25 01:11:10.000000000 
+0200
@@ -323,7 +323,7 @@
 int     rec_goto(VSTREAM *stream, const char *buf)
 {
     off_t   offset;
-    static const char *saved_path;
+    static char *saved_path;
     static off_t saved_offset;
     static int reverse_count;
 
@@ -338,8 +338,10 @@
      */
 #define REVERSE_JUMP_LIMIT     10000
 
-    if (saved_path != VSTREAM_PATH(stream)) {
-       saved_path = VSTREAM_PATH(stream);
+    if (saved_path == 0 || strcmp(saved_path, VSTREAM_PATH(stream)) != 0) {
+       if (saved_path)
+           myfree(saved_path);
+       saved_path = mystrdup(VSTREAM_PATH(stream));
        reverse_count = 0;
        saved_offset = 0;
     }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/postfix-3.6.1/src/postscreen/postscreen_tests.c 
new/postfix-3.6.2/src/postscreen/postscreen_tests.c
--- old/postfix-3.6.1/src/postscreen/postscreen_tests.c 2021-02-17 
01:07:26.000000000 +0100
+++ new/postfix-3.6.2/src/postscreen/postscreen_tests.c 2021-07-24 
23:26:54.000000000 +0200
@@ -175,6 +175,7 @@
      * at the time that the cache entry was written.
      */
     for (sp = time_stamps; sp < time_stamps + PSC_TINDX_COUNT; sp++) {
+       errno = 0;
        *sp = strtoul(start, &cp, 10);
        if (*start == 0 || (*cp != '\0' && *cp != ';') || errno == ERANGE)
            *sp = PSC_TIME_STAMP_DISABLED;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/postfix-3.6.1/src/smtpd/smtpd.c 
new/postfix-3.6.2/src/smtpd/smtpd.c
--- old/postfix-3.6.1/src/smtpd/smtpd.c 2021-04-19 00:07:09.000000000 +0200
+++ new/postfix-3.6.2/src/smtpd/smtpd.c 2021-07-24 23:43:57.000000000 +0200
@@ -1301,6 +1301,7 @@
 int     var_defer_code;
 int     var_smtpd_err_sleep;
 int     var_non_fqdn_code;
+char   *var_bounce_rcpt;
 char   *var_error_rcpt;
 int     var_smtpd_delay_reject;
 char   *var_rest_classes;
@@ -6431,6 +6432,7 @@
        VAR_EOD_CHECKS, DEF_EOD_CHECKS, &var_eod_checks, 0, 0,
        VAR_MAPS_RBL_DOMAINS, DEF_MAPS_RBL_DOMAINS, &var_maps_rbl_domains, 0, 0,
        VAR_RBL_REPLY_MAPS, DEF_RBL_REPLY_MAPS, &var_rbl_reply_maps, 0, 0,
+       VAR_BOUNCE_RCPT, DEF_ERROR_RCPT, &var_bounce_rcpt, 1, 0,
        VAR_ERROR_RCPT, DEF_ERROR_RCPT, &var_error_rcpt, 1, 0,
        VAR_REST_CLASSES, DEF_REST_CLASSES, &var_rest_classes, 0, 0,
        VAR_CANONICAL_MAPS, DEF_CANONICAL_MAPS, &var_canonical_maps, 0, 0,
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/postfix-3.6.1/src/smtpd/smtpd_chat.c 
new/postfix-3.6.2/src/smtpd/smtpd_chat.c
--- old/postfix-3.6.1/src/smtpd/smtpd_chat.c    2018-08-27 23:54:59.000000000 
+0200
+++ new/postfix-3.6.2/src/smtpd/smtpd_chat.c    2021-07-24 23:43:57.000000000 
+0200
@@ -316,7 +316,8 @@
 #define INDENT 4
 
     notice = post_mail_fopen_nowait(mail_addr_double_bounce(),
-                                   var_error_rcpt,
+                                   (state->error_mask & MAIL_ERROR_BOUNCE) ?
+                                   var_bounce_rcpt : var_error_rcpt,
                                    MAIL_SRC_MASK_NOTIFY, NULL_TRACE_FLAGS,
                                    SMTPUTF8_FLAG_NONE, NO_QUEUE_ID);
     if (notice == 0) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/postfix-3.6.1/src/util/dict_thash.c 
new/postfix-3.6.2/src/util/dict_thash.c
--- old/postfix-3.6.1/src/util/dict_thash.c     2017-12-27 23:29:45.000000000 
+0100
+++ new/postfix-3.6.2/src/util/dict_thash.c     2021-06-14 22:20:18.000000000 
+0200
@@ -46,6 +46,7 @@
 /* Utility library. */
 
 #include <msg.h>
+#include <mymalloc.h>
 #include <iostuff.h>
 #include <vstring.h>
 #include <stringops.h>
@@ -180,6 +181,24 @@
                         " is this an alias file?", path, lineno);
 
            /*
+            * Optionally treat the value as a filename, and replace the value
+            * with the BASE64-encoded content of the named file.
+            */
+           if (dict_flags & DICT_FLAG_SRC_RHS_IS_FILE) {
+               VSTRING *base64_buf;
+               char   *err;
+
+               if ((base64_buf = dict_file_to_b64(dict, value)) == 0) {
+                   err = dict_file_get_error(dict);
+                   msg_warn("%s, line %d: %s: skipping this entry",
+                            VSTREAM_PATH(fp), lineno, err);
+                   myfree(err);
+                   continue;
+               }
+               value = vstring_str(base64_buf);
+           }
+
+           /*
             * Store the value under the key. Handle duplicates
             * appropriately. XXX Move this into dict_ht, but 1) that map
             * ignores duplicates by default and we would have to check that
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/postfix-3.6.1/src/util/mac_expand.c 
new/postfix-3.6.2/src/util/mac_expand.c
--- old/postfix-3.6.1/src/util/mac_expand.c     2021-01-09 22:52:12.000000000 
+0100
+++ new/postfix-3.6.2/src/util/mac_expand.c     2021-07-24 23:26:54.000000000 
+0200
@@ -274,6 +274,7 @@
     long    result;
     char   *remainder;
 
+    errno = 0;
     result = strtol(strval, &remainder, 10);
     if (*strval == 0 /* can't happen */ || *remainder != 0 || errno == ERANGE)
        msg_fatal("mac_exp_eval: bad conversion: %s", strval);

++++++ postfix-SUSE.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/postfix-SUSE/config.postfix 
new/postfix-SUSE/config.postfix
--- old/postfix-SUSE/config.postfix     2021-07-07 00:14:50.322245382 +0200
+++ new/postfix-SUSE/config.postfix     2021-07-26 21:58:26.855861878 +0200
@@ -95,7 +95,7 @@
     if [ "${POSTFIX_DKIM_CONN,,}" == 'socket' -a \
             "${POSTFIX_WITH_DKIM,,}" != 'no' ]; then
         if [[ -f /etc/opendkim/opendkim.conf ]]; then
-          DKIM_SOCKET=$(awk -F':' '/^Socket(\s|\t)+local/ {print $2}' 
/etc/opendkim/opendkim
+           DKIM_SOCKET=$(awk -F':' '/^Socket(\s|\t)+local/ {print $2}' 
/etc/opendkim/opendkim)
             # support for old socket dir '/var/run'
             if [[ "${DKIM_SOCKET}" =~ ^/var/run ]]; then
                 OLD_DKIM_SOCKET='true'

Reply via email to