From 52b8aa248f2d4dd8e6c55bd1b710535e5806b66f Mon Sep 17 00:00:00 2001 From: Michael Orlitzky Date: Fri, 14 Jun 2019 09:32:58 -0400 Subject: mail-filter/opendkim: drop --enable-popauth flag. The "--enable-popauth" flag was enabled automatically when USE=berkdb was set, which already doesn't make any sense. This was noticed while investigating bug 684958. However, "popauth" refers to POP-before-SMTP, which is an outdated and altogether ridiculous way of authenticating. No one competent has used it since the 1990s. Instead of converting it to an independent local USE flag, this new -r15 just drops it. Bug: https://bugs.gentoo.org/687972 Signed-off-by: Michael Orlitzky Package-Manager: Portage-2.3.66, Repoman-2.3.11 --- mail-filter/opendkim/opendkim-2.10.3-r14.ebuild | 231 ------------------------ mail-filter/opendkim/opendkim-2.10.3-r15.ebuild | 230 +++++++++++++++++++++++ 2 files changed, 230 insertions(+), 231 deletions(-) delete mode 100644 mail-filter/opendkim/opendkim-2.10.3-r14.ebuild create mode 100644 mail-filter/opendkim/opendkim-2.10.3-r15.ebuild (limited to 'mail-filter/opendkim') diff --git a/mail-filter/opendkim/opendkim-2.10.3-r14.ebuild b/mail-filter/opendkim/opendkim-2.10.3-r14.ebuild deleted file mode 100644 index ff45f1dac4db..000000000000 --- a/mail-filter/opendkim/opendkim-2.10.3-r14.ebuild +++ /dev/null @@ -1,231 +0,0 @@ -# Copyright 1999-2019 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI=6 - -inherit autotools db-use eutils systemd tmpfiles user - -DESCRIPTION="A milter providing DKIM signing and verification" -HOMEPAGE="http://opendkim.org/" -SRC_URI="mirror://sourceforge/opendkim/${P}.tar.gz" - -# The GPL-2 is for the init script, bug 425960. -LICENSE="BSD GPL-2 Sendmail-Open-Source" -SLOT="0" -KEYWORDS="~amd64 ~arm ~x86" -IUSE="+berkdb ldap libressl lmdb lua memcached opendbx poll sasl selinux +ssl static-libs test unbound" - -COMMON_DEPEND="|| ( mail-filter/libmilter mail-mta/sendmail ) - dev-libs/libbsd - sys-apps/grep - ssl? ( - !libressl? ( dev-libs/openssl:0= ) - libressl? ( dev-libs/libressl:0= ) - ) - berkdb? ( >=sys-libs/db-3.2:* ) - opendbx? ( >=dev-db/opendbx-1.4.0 ) - lua? ( dev-lang/lua:* ) - ldap? ( net-nds/openldap ) - lmdb? ( dev-db/lmdb ) - memcached? ( dev-libs/libmemcached ) - sasl? ( dev-libs/cyrus-sasl ) - unbound? ( >=net-dns/unbound-1.4.1:= net-dns/dnssec-root ) - !unbound? ( net-libs/ldns )" - -DEPEND="${COMMON_DEPEND} - test? ( dev-lang/lua:* )" - -RDEPEND="${COMMON_DEPEND} - sys-process/psmisc - selinux? ( sec-policy/selinux-dkim )" - -REQUIRED_USE="sasl? ( ldap )" - -PATCHES=( - "${FILESDIR}/${P}-openrc.patch" - "${FILESDIR}/${P}-openssl-1.1.1.patch.r2" -) - -pkg_setup() { - # This user can read your private keys, and must therefore not be - # shared with any other package. - enewgroup opendkim - enewuser opendkim -1 -1 -1 opendkim -} - -src_prepare() { - default - sed -e 's:/var/db/dkim:/var/lib/opendkim:g' \ - -i opendkim/opendkim.conf.sample opendkim/opendkim.conf.simple.in \ - || die - sed -e 's:dist_doc_DATA:dist_html_DATA:' \ - -i libopendkim/docs/Makefile.am \ - || die - eautoreconf -} - -src_configure() { - local myconf=() - if use berkdb ; then - myconf+=( - --with-db-incdir=$(db_includedir) - --enable-popauth - --enable-query_cache - --enable-stats - ) - fi - if use unbound; then - myconf+=( --with-unbound ) - else - myconf+=( --with-ldns ) - fi - if use ldap; then - myconf+=( $(use_with sasl) ) - fi - - # We install the our configuration filed under e.g. /etc/opendkim, - # so the next line is necessary to point the daemon and all of its - # documentation to the right location by default. - myconf+=( --sysconfdir="${EPREFIX}/etc/${PN}" ) - - econf \ - $(use_with berkdb db) \ - $(use_with opendbx odbx) \ - $(use_with lua) \ - $(use_enable lua rbl) \ - $(use_with ldap openldap) \ - $(use_with lmdb) \ - $(use_enable poll) \ - $(use_enable static-libs static) \ - $(use_with memcached libmemcached) \ - "${myconf[@]}" \ - --enable-filter \ - --enable-atps \ - --enable-identity_header \ - --enable-rate_limit \ - --enable-resign \ - --enable-replace_rules \ - --enable-default_sender \ - --enable-sender_macro \ - --enable-vbr \ - --disable-live-testing \ - --with-test-socket="${T}/opendkim.sock" -} - -src_compile() { - emake runstatedir=/run -} - -src_install() { - default - find "${D}" -name '*.la' -type f -delete || die - - dosbin stats/opendkim-reportstats - - newinitd "${S}/contrib/OpenRC/opendkim.openrc" "${PN}" - systemd_newtmpfilesd "${S}/contrib/systemd/opendkim.tmpfiles" "${PN}.conf" - systemd_newunit "contrib/systemd/opendkim.service" "${PN}.service" - - dodir /etc/opendkim - keepdir /var/lib/opendkim - - # The OpenDKIM data (particularly, your keys) should be read-only to - # the UserID that the daemon runs as. - fowners root:opendkim /var/lib/opendkim - fperms 750 /var/lib/opendkim - - # Tweak the "simple" example configuration a bit before installing - # it unconditionally. - local cf="${T}/opendkim.conf" - # Some MTAs are known to break DKIM signatures with "simple" - # canonicalization [1], so we choose the "relaxed" policy - # over OpenDKIM's current default settings. - # [1] https://wordtothewise.com/2016/12/dkim-canonicalization-or-why-microsoft-breaks-your-mail/ - sed -E -e 's:^(Canonicalization)[[:space:]]+.*:\1\trelaxed/relaxed:' \ - "${S}/opendkim/opendkim.conf.simple" >"${cf}" || die - cat >>"${cf}" <"${cf}" || die + cat >>"${cf}" <