]> git.ipfire.org Git - people/pmueller/ipfire-2.x.git/commitdiff
fetchmail: Update to 6.4.19 and using python3
authorAdolf Belka <adolf.belka@ipfire.org>
Wed, 5 May 2021 21:43:06 +0000 (23:43 +0200)
committerMichael Tremer <michael.tremer@ipfire.org>
Thu, 6 May 2021 09:53:31 +0000 (09:53 +0000)
- Update from 6.3.26 (2013-04-23) to 6.4.19 (2021-04-24)
- Update rootfile
- Delete fetchmail-6.3.26-permit-build-without-ssl3.patch as it is not
   needed with version 6.4.19
- Added command to use python3 to lfs
- Changelog is too large to include here
   Full details can be found in NEWS file in the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
config/rootfiles/packages/fetchmail
lfs/fetchmail
src/patches/fetchmail-6.3.26-permit-build-without-ssl3.patch [deleted file]

index 01141380b84fe0057e0330590bce383bf769a60b..9a6492f0bb057e89c05fe5d17be6cb9931c04848 100644 (file)
@@ -2,9 +2,7 @@ etc/rc.d/init.d/fetchmail
 root/.fetchmailrc
 usr/bin/fetchmail
 #usr/bin/fetchmailconf
-#usr/lib/python2.7/site-packages/fetchmailconf.py
-#usr/lib/python2.7/site-packages/fetchmailconf.pyc
-#usr/lib/python2.7/site-packages/fetchmailconf.pyo
+#usr/lib/python3.8/site-packages/fetchmailconf.py
 #usr/share/man/man1/fetchmail.1
 #usr/share/man/man1/fetchmailconf.1
 var/ipfire/backup/addons/includes/fetchmail
index 5e8aae41691bd51a3a55a74c0a481adb8124b7f5..aed08aae2b965bac7591057fac7bdf1f001b3fd3 100644 (file)
@@ -24,7 +24,7 @@
 
 include Config
 
-VER        = 6.3.26
+VER        = 6.4.19
 
 THISAPP    = fetchmail-$(VER)
 DL_FILE    = $(THISAPP).tar.xz
@@ -32,7 +32,7 @@ DL_FROM    = $(URL_IPFIRE)
 DIR_APP    = $(DIR_SRC)/$(THISAPP)
 TARGET     = $(DIR_INFO)/$(THISAPP)
 PROG       = fetchmail
-PAK_VER    = 9
+PAK_VER    = 10
 
 DEPS       =
 
@@ -44,7 +44,7 @@ objects = $(DL_FILE)
 
 $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
 
-$(DL_FILE)_MD5 = 61b66faad044afa26e142bb1791aa2b3
+$(DL_FILE)_MD5 = f9c2fe96065b19f168ad834a7e3e0a25
 
 install : $(TARGET)
 
@@ -77,9 +77,9 @@ $(subst %,%_MD5,$(objects)) :
 $(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects))
        @$(PREBUILD)
        @rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar Jxf $(DIR_DL)/$(DL_FILE)
-       cd $(DIR_APP) && patch -Np1 < $(DIR_SRC)/src/patches/fetchmail-6.3.26-permit-build-without-ssl3.patch
        $(UPDATE_AUTOMAKE)
-       cd $(DIR_APP) && ./configure \
+       cd $(DIR_APP) && PYTHON=python3 \
+               ./configure \
                --prefix=/usr \
                --with-ssl \
                --disable-nls
diff --git a/src/patches/fetchmail-6.3.26-permit-build-without-ssl3.patch b/src/patches/fetchmail-6.3.26-permit-build-without-ssl3.patch
deleted file mode 100644 (file)
index 5f8b277..0000000
+++ /dev/null
@@ -1,62 +0,0 @@
-From a2ae6f8d15d7caf815d7bdd13df833fd1b2af5cc Mon Sep 17 00:00:00 2001
-From: Matthias Andree <matthias.andree@gmx.de>
-Date: Fri, 16 Jan 2015 20:48:46 +0100
-Subject: [PATCH] Permit build on SSLv3-disabled OpenSSL,
-
-providing that these also omit the declaration of SSLv3_client_method().
-Related to Debian Bug#775255.
-Version report lists -SSLv3 on +SSL builds that omit SSLv3_client_method().
-Version report lists -SSLv2 on +SSL builds that omit SSLv2_client_method().
-
-diff --git a/configure.ac b/configure.ac
-index bdcbb20..9248b26 100644
---- a/configure.ac
-+++ b/configure.ac
-@@ -803,6 +803,7 @@ fi
- case "$LIBS" in *-lssl*)
-       AC_CHECK_DECLS([SSLv2_client_method],,,[#include <openssl/ssl.h>])
-+      AC_CHECK_DECLS([SSLv3_client_method],,,[#include <openssl/ssl.h>])
-       ;;
- esac
-diff --git a/fetchmail.c b/fetchmail.c
-index 5f31d6e..be0e9ab 100644
---- a/fetchmail.c
-+++ b/fetchmail.c
-@@ -263,6 +263,12 @@ int main(int argc, char **argv)
- #ifdef SSL_ENABLE
-       "+SSL"
- #endif
-+#if HAVE_DECL_SSLV2_CLIENT_METHOD + 0 == 0
-+      "-SSLv2"
-+#endif
-+#if HAVE_DECL_SSLV3_CLIENT_METHOD + 0 == 0
-+      "-SSLv3"
-+#endif
- #ifdef OPIE_ENABLE
-       "+OPIE"
- #endif /* OPIE_ENABLE */
-
-diff --git a/socket.c b/socket.c
-index 58a8e15..91a21c2 100644
---- a/socket.c
-+++ b/socket.c
-@@ -910,11 +910,16 @@ int SSLOpen(int sock, char *mycert, char *mykey, const char *myproto, int certck
- #if HAVE_DECL_SSLV2_CLIENT_METHOD + 0 > 0
-                       _ctx[sock] = SSL_CTX_new(SSLv2_client_method());
- #else
--                      report(stderr, GT_("Your operating system does not support SSLv2.\n"));
-+                      report(stderr, GT_("Your OpenSSL version does not support SSLv2.\n"));
-                       return -1;
- #endif
-               } else if(!strcasecmp("ssl3",myproto)) {
-+#if HAVE_DECL_SSLV3_CLIENT_METHOD + 0 > 0
-                       _ctx[sock] = SSL_CTX_new(SSLv3_client_method());
-+#else
-+                      report(stderr, GT_("Your OpenSSL version does not support SSLv3.\n"));
-+                      return -1;
-+#endif
-               } else if(!strcasecmp("tls1",myproto)) {
-                       _ctx[sock] = SSL_CTX_new(TLSv1_client_method());
-               } else if (!strcasecmp("ssl23",myproto)) {