Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package fetchmail for openSUSE:Factory checked in at 2022-07-18 18:34:32 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/fetchmail (Old) and /work/SRC/openSUSE:Factory/.fetchmail.new.1523 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "fetchmail" Mon Jul 18 18:34:32 2022 rev:103 rq:989821 version:6.4.31 Changes: -------- --- /work/SRC/openSUSE:Factory/fetchmail/fetchmail.changes 2022-06-21 16:38:03.644308217 +0200 +++ /work/SRC/openSUSE:Factory/.fetchmail.new.1523/fetchmail.changes 2022-07-18 18:34:51.909837462 +0200 @@ -1,0 +2,17 @@ +Mon Jul 18 08:26:23 UTC 2022 - David Anes <david.a...@suse.com> + +- update to 6.4.31 + * Bugfixes: + - Try to fix ./configure --with-ssl=... for systems that have + multiple OpenSSL versions installed. Issues reported by + Dennis Putnam. + - The netrc parser now reports its errors to syslog or logfile + when appropriate, previously it would always log to stderr. + - Add error checking to .netrc parser. + * Changes: + - manpage: use .UR/.UE macros instead of .URL for URIs. + - manpage: fix contractions. Found with FreeBSD's igor tool. + - manpage: HTML now built with pandoc -> python-docutils + (manServer.pl was dropped) + +------------------------------------------------------------------- Old: ---- fetchmail-6.4.30.tar.xz fetchmail-6.4.30.tar.xz.asc New: ---- fetchmail-6.4.31.tar.xz fetchmail-6.4.31.tar.xz.asc ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ fetchmail.spec ++++++ --- /var/tmp/diff_new_pack.L5dgno/_old 2022-07-18 18:34:52.465838310 +0200 +++ /var/tmp/diff_new_pack.L5dgno/_new 2022-07-18 18:34:52.469838315 +0200 @@ -21,7 +21,7 @@ %define _fillupdir %{_localstatedir}/adm/fillup-templates %endif Name: fetchmail -Version: 6.4.30 +Version: 6.4.31 Release: 0 Summary: Full-Featured POP and IMAP Mail Retrieval Daemon License: GPL-2.0-or-later ++++++ fetchmail-6.4.30.tar.xz -> fetchmail-6.4.31.tar.xz ++++++ ++++ 34899 lines of diff (skipped) ++++++ fetchmail-add-imap-oauthbearer-support.patch ++++++ --- /var/tmp/diff_new_pack.L5dgno/_old 2022-07-18 18:34:52.853838901 +0200 +++ /var/tmp/diff_new_pack.L5dgno/_new 2022-07-18 18:34:52.857838907 +0200 @@ -17,10 +17,10 @@ rcfile_l.l | 1 8 files changed, 136 insertions(+), 3 deletions(-) -Index: fetchmail-6.4.25/conf.c +Index: fetchmail-6.4.31/conf.c =================================================================== ---- fetchmail-6.4.25.orig/conf.c -+++ fetchmail-6.4.25/conf.c +--- fetchmail-6.4.31.orig/conf.c ++++ fetchmail-6.4.31/conf.c @@ -288,6 +288,8 @@ void dump_config(struct runctl *runp, st stringdump("auth", "otp"); else if (ctl->server.authenticate == A_MSN) @@ -30,10 +30,10 @@ #ifdef HAVE_RES_SEARCH booldump("dns", ctl->server.dns); -Index: fetchmail-6.4.25/fetchmail.c +Index: fetchmail-6.4.31/fetchmail.c =================================================================== ---- fetchmail-6.4.25.orig/fetchmail.c -+++ fetchmail-6.4.25/fetchmail.c +--- fetchmail-6.4.31.orig/fetchmail.c ++++ fetchmail-6.4.31/fetchmail.c @@ -1783,6 +1783,9 @@ static void dump_params (struct runctl * case A_SSH: printf(GT_(" End-to-end encryption assumed.\n")); @@ -44,10 +44,10 @@ } if (ctl->server.principal != (char *) NULL) printf(GT_(" Mail service principal is: %s\n"), ctl->server.principal); -Index: fetchmail-6.4.25/fetchmail.h +Index: fetchmail-6.4.31/fetchmail.h =================================================================== ---- fetchmail-6.4.25.orig/fetchmail.h -+++ fetchmail-6.4.25/fetchmail.h +--- fetchmail-6.4.31.orig/fetchmail.h ++++ fetchmail-6.4.31/fetchmail.h @@ -79,6 +79,7 @@ struct addrinfo; #define A_SSH 8 /* authentication at session level */ #define A_MSN 9 /* same as NTLM with keyword MSN */ @@ -64,11 +64,11 @@ #define PASSWORDLEN 256 /* max password length */ #define DIGESTLEN 33 /* length of MD5 digest */ -Index: fetchmail-6.4.25/fetchmail.man +Index: fetchmail-6.4.31/fetchmail.man =================================================================== ---- fetchmail-6.4.25.orig/fetchmail.man -+++ fetchmail-6.4.25/fetchmail.man -@@ -1001,7 +1001,7 @@ AUTHENTICATION below for details). The +--- fetchmail-6.4.31.orig/fetchmail.man ++++ fetchmail-6.4.31/fetchmail.man +@@ -1004,7 +1004,7 @@ AUTHENTICATION below for details). The \&\fBpassword\fP, \fBkerberos_v5\fP, \fBkerberos\fP (or, for excruciating exactness, \fBkerberos_v4\fP), \fBgssapi\fP, \fBcram\-md5\fP, \fBotp\fP, \fBntlm\fP, \fBmsn\fP (only for POP3), @@ -77,10 +77,13 @@ When \fBany\fP (the default) is specified, fetchmail tries first methods that do not require a password (EXTERNAL, GSSAPI, KERBEROS\ IV, KERBEROS\ 5); then it looks for methods that mask your password -@@ -1025,6 +1025,23 @@ GSSAPI or K4. Choosing KPOP protocol au - authentication. This option does not work with ETRN. GSSAPI service names are +@@ -1029,8 +1029,24 @@ authentication. This option does not wo in line with RFC-2743 and IANA registrations, see - .URL https://www.iana.org/assignments/gssapi-service-names/ "Generic Security Service Application Program Interface (GSSAPI)/Kerberos/Simple Authentication and Security Layer (SASL) Service Names" . + .UR https://www.iana.org/assignments/gssapi-service-names/ + Generic Security Service Application Program Interface (GSSAPI)/Kerberos/Simple +-Authentication and Security Layer (SASL) Service Names +-.UE . ++Authentication and Security Layer (SASL) Service Names . +.sp +\fBoauthbearer\fP expects the supplied password to be an oauth2 authentication +token instead of a password, as used by services like gmail. @@ -101,7 +104,7 @@ .SS Miscellaneous Options .TP .B \-f <pathname> | \-\-fetchmailrc <pathname> -@@ -2322,7 +2339,9 @@ Legal protocol identifiers for use with +@@ -2323,7 +2339,9 @@ Legal protocol identifiers for use with .PP Legal authentication types are 'any', 'password', 'kerberos', \&'kerberos_v4', 'kerberos_v5' and 'gssapi', 'cram\-md5', 'otp', 'msn' @@ -112,10 +115,10 @@ The 'password' type specifies authentication by normal transmission of a password (the password may be plain text or subject to protocol-specific encryption as in CRAM-MD5); -Index: fetchmail-6.4.25/fetchmailconf.py +Index: fetchmail-6.4.31/fetchmailconf.py =================================================================== ---- fetchmail-6.4.25.orig/fetchmailconf.py -+++ fetchmail-6.4.25/fetchmailconf.py +--- fetchmail-6.4.31.orig/fetchmailconf.py ++++ fetchmail-6.4.31/fetchmailconf.py @@ -500,7 +500,7 @@ defaultports = {"auto":None, "ODMR":"odmr"} @@ -125,10 +128,10 @@ listboxhelp = { 'title' : 'List Selection Help', -Index: fetchmail-6.4.25/imap.c +Index: fetchmail-6.4.31/imap.c =================================================================== ---- fetchmail-6.4.25.orig/imap.c -+++ fetchmail-6.4.25/imap.c +--- fetchmail-6.4.31.orig/imap.c ++++ fetchmail-6.4.31/imap.c @@ -26,6 +26,10 @@ #define IMAP4 0 /* IMAP4 rev 0, RFC1730 */ #define IMAP4rev1 1 /* IMAP4 rev 1, RFC2060 */ @@ -268,10 +271,10 @@ /* Yahoo hack - we'll just try ID if it was offered by the server, * and IGNORE errors. */ { -Index: fetchmail-6.4.25/options.c +Index: fetchmail-6.4.31/options.c =================================================================== ---- fetchmail-6.4.25.orig/options.c -+++ fetchmail-6.4.25/options.c +--- fetchmail-6.4.31.orig/options.c ++++ fetchmail-6.4.31/options.c @@ -421,6 +421,8 @@ int parsecmdline (int argc /** argument ctl->server.authenticate = A_ANY; else if (strcmp(optarg, "msn") == 0) @@ -281,10 +284,10 @@ else { fprintf(stderr,GT_("Invalid authentication `%s' specified.\n"), optarg); errflag++; -Index: fetchmail-6.4.25/rcfile_l.l +Index: fetchmail-6.4.31/rcfile_l.l =================================================================== ---- fetchmail-6.4.25.orig/rcfile_l.l -+++ fetchmail-6.4.25/rcfile_l.l +--- fetchmail-6.4.31.orig/rcfile_l.l ++++ fetchmail-6.4.31/rcfile_l.l @@ -106,6 +106,7 @@ cram(-md5)? { SETSTATE(0); yylval.proto msn { SETSTATE(0); yylval.proto = A_MSN; return AUTHTYPE;} ntlm { SETSTATE(0); yylval.proto = A_NTLM; return AUTHTYPE;}