autobuild-2.11.0-bp155.3.15 >  A dkSI%z ^+f pv9bH90! Kӟ޺ M 4FÿaEcV+~Ǚ|u\-)R(LAb%sC㠍rIgn#=LyN7ufP^B-JSxgi]SYe6ׁ>fi(UfѮl;szԽtй&ڜn|()kH+瀆] ckr[[+͗nsw'#p2DysB7%ٮ8\$wH0$ 5{B홎9۷+3=o=aU4 ~S@7,~ߍnhUM/YaS+tC%'d\Q${R,%z @J'˺Cp|IG !km5=fAɎ`e%; 6 ʫ|Ï{062ed38524bf6504ea0aeebd55c5a66c837cf3fd9d2d8db487821bfab755df5a89dc25007749b982a289d059d3ca39880f5804c3JdkSI%z xW1bJ6z0M7軶^kvUOQ`Ȗop?ǻiJ$+QSSS!{** U $;L7n՝S>,wiJJ)`!3?p2w q\A5 >p>)L?)<d   @ ,EKTl x     8X   (89:F$G$H$I$X$Y$\%]%,^%wb&c&d'e'f'!l'#u'8v'Pw(x(y(z(((()8Cautobuild2.11.0bp155.3.15Multiple configuration build toolConfigures, builds and tests a source code package whose configuration is provided by GNU's autoconf mechanism.dkScobs-arm-8 SUSE Linux Enterprise 15 SP5openSUSEBSD-3-Clausehttps://bugs.opensuse.orgDevelopment/Tools/Buildinghttp://www.opendkim.org/linuxaarch64yA큤A큤dkS]dkS\dkSZdkSb[*dkS[f4626857b44662f7c2ae7946ece6525ac817b0e8b0c7a74048d1e192015cbbe8011f919ba3d28077f81dd259ad2ad69c8098cf16208645f718565c85b67b5ab5fe8cfca2e2e144cd9f202712d93799300e2488232ac4c2428bc03d2902ba58d300d949e2e4ca0b87db60998d118ca47c69e2499d17c83a233474fcb9756171f1rootrootrootrootrootrootrootrootrootrootrootrootopendkim-2.11.0-bp155.3.15.src.rpmautobuildautobuild(aarch-64)@@@@@@@    ld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libjansson.so.4()(64bit)libm.so.6()(64bit)libm.so.6(GLIBC_2.29)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3amaah`E_=@__ L[[5@[5@[ @Y.XVwV&@U>$U>$T{T|X@Johannes Segitz Togan Muftuoglu Christian Wittmer Dominique Leuenberger Thorsten Kukuk Thorsten Kukuk mrueckert@suse.demrueckert@suse.dekbabioch@suse.comopensuse@dstoecker.dejengelh@inai.derpm@fthiessen.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.de- Added hardening to systemd service (bsc#1181400). Added patch: * harden_opendkim.service.patch Modified: * opendkim.service- Add cve-2020-12272.patch (CVE-2020-12272) * Confirm that the value of "d=" is properly formed, fixed upstream in commit 14d54524e0a97d3fe9b80441907d7e356c9ded04 - Add unbound-fix.patch * Plug memory leak in Unbound callback https://github.com/trusteddomainproject/OpenDKIM/pull/57- add opendkim to Group unbound to be able to read TrustAnchorFile - add postfix to Group opendkim to be able to read/write to opendkim.sock - add %{_sysconfdir}/%{name}/keys dir - change /var/run to /run wherever used - rework opendkim-2.9.2_default_config.patch and renamed it to opendkim-default_config.patch- Fix usage of %{_libexecdir} when %{_tmpfilesdir} was meant to be used.- opendkim calls openssl, make sure the command is there- Use systemd_ordering instead of systemd_requires for container - Update to opendkim 2.11.0-Beta2 - Add support for ED25519 keys - Add compatibility with openssl-1.1.0 - Feature request #190: Reject signature object requests where the domain name or selector includes non-printable characters. - Feature requrest #187: Add option to match subdomains when generating zone files. - Many bug fixes - Obsoletes opendkim.ticket35+37.patch - Disable erlang, new erlang version seems to miss required files- https://src.fedoraproject.org/rpms/opendkim/raw/master/f/opendkim.ticket35+37.patch allow building on newer distros (openssl 1.1 support)- fix the previous change: source files got added but the renumbering was not applied to the reference to the source files -> signature file was installed as services file- Applied spec-cleaner to spec file - Removed conditionals around %license macro - Used OpenPGP signature provided upstream - Added opendkim.keyring containing the key used to sign official releases.- enable DNSSEC support (requires unbound library) ATTENTION: The file /var/lib/unbound/root.key must be readable by user opendkim, which is not the fact for older unbound packages- Remove some idempotent %if blocks.- Implemented shared-library-packaging-policy * Splitted shared libraries - Some spec file cleanup - Splitted autobuild and miltertest programs into own subpackages- require main package from devel package - fix conditional for sql support. it was mixed with sql and opendkim_sql - make RRD support optional pulls a lot of things. - use correct license for the sendmail part- update to 2.10.3 - LIBOPENDKIM: Make strict header checking non-destructive. The last change to this code resulted in failing signatures. Reported by Pedro Morales and Wez Furlong. - changes from 2.10.2 - Fix bug #221: Report a DKIM result of "policy" if MinimumKeyBits or UnprotectedKey cause the signature to result in a "pass" override. Reported by Kurt Roeckx. - Fix bug #227: Revert removal of SenderHeaders configuration setting. Document that it is now limited to signature selection. - LIBOPENDKIM: Fix bug #226: Deal with header fields that are wrapped before there's any content. Reported by Alessandro Vesely. - CONTRIB: Update to contrib/systemd/opendkim.service.in from Steve Jenkins. - refreshed opendkim-2.9.2_default_config.patch to apply cleanly again- cleanup build requires- update to 2.10.1 Make DB_SIGNINGTABLE symbol available in Lua scripts. Problem noted by Klaus Heinrich. Fix bug #214: Handle arbitrarily large From: fields. Reported by Tomohiko Sasaki. LIBOPENDKIM: Fix bug #213: Remove "dkim_default_senderhdrs" from dkim.h. Problem noted by Daniel J. Luke. LIBOPENDKIM: Fix bug #219: Unresolved CNAMEs are not failures, according to the DNS (see RFC6604), so report them as NXDOMAIN or similar. Reported by Alessandro Vesely. - changes from 2.10.0 Feature request #182: Remove "AddAllSignatureResults". All signature results will now be added via Authentication-Results header fields. Requested by Tomki Camp. Feature request #180: Rename "LDAPSoftStart" to "SoftStart" and apply it to SQL connections as well. Requested by Daniel Kauffman. Feature request #179: Add "IgnoreMalformedMail" option. Fix bug #183: Discontinue support for ADSP. This removes the following configuration file items: AddAllSignatureResults LocalADSP ADSPAction NoDiscardableMailTo ADSPNoSuchDomain On-PolicyError BogusPolicy SendADSPReports DisableADSP SenderHeaders LDAPSoftStart UnprotectedPolicy Make "rrvs" and "smime" recognized Authentication-Results methods. LIBOPENDKIM: Feature request #157: Add dkim_mail_parse_multi(). Suggested by Alessandro Vesely. LIBOPENDKIM: Feature request #185: Add dkim_set_dnssec(). Patch from Alec Peterson. LIBOPENDKIM: Fix bug #183: Discontinue support for ADSP. This means all of the following: - the dkim_policy_t type has been removed - the DKIM_POLICY_* constants have been removed - the DKIM_PRESULT_* constants have been removed - passing DKIM_OPTS_SENDERHDRS to dkim_options() now results in an error - the DKIM_PSTATE structure has been removed - all of the following functions have been removed: dkim_policy(), dkim_policy_dnssec(), dkim_policy_getqueries(), dkim_policy_getreportinfo(), dkim_policy_state_free(), dkim_policy_state_new(), dkim_policy_syntax(), dkim_getpolicystr(), dkim_getpresult(), dkim_getpresultstr(), dkim_set_policy_lookup(), dkim_test_adsp() LIBOPENDKIM: DKIM_LIBFLAGS_STRICTHDRS now also confirms syntactical validity of the From field before proceeding with a signing or verifying operation. Suggested by Wez Furlong. CONTRIB: Fix bug #207: Clean up the "stats" directory. CONTRIB: Add "repute" directory which could eventually replace the PHP implementation. Submitted by Daniel Black. CONTRIB: Patches to systemd and init/redhat from Steve Jenkins. - changes from 2.9.3 Fix bug #177: Plug leaking "result" structures when OpenLDAP is in use. Truncate configuration file lines at carriage return. Replace overlapping strlcpy() with memmove() in dkim_get_key_file(). Reported by Daniel J. Luke. Patch #32: Re-arrange the execution logic to drop privileges in proper order. LIBOPENDKIM: dkim_header() is now a lot more strict about the input it will accept (see RFC5322 Section 2.2). LIBOPENDKIM: Tighten relaxed modes to break on only DKIM-defined whitespace characters. Problem noted by Elizabeth Zwicky. LIBOPENDKIM: Fix bug #208: If a signature fails to verify for either reason (header hash mismatched or body hash mismatched), set DKIM_SIGERROR_BADSIG so that Authentication-Results doesn't report a failure with "no signature error". TOOLS: Feature request #178: Add "-F" flag to opendkim-genzone so records are created with the FQDN. Patch from Andreas Schulze. REPUTATION: Handle parameters safely in repute.php. Reported by Daniel Black. - refreshed patches to apply cleanly again: opendkim-2.9.2_compiler_warnings.patch opendkim-2.9.2_default_config.patch - use the correct signal for reloading the config - make sure that all the buildrequires we added are actually used by adding the needed --with-* options- more work on integration with the distribution - added init system support (systemd,sysvinit) - adapt the default config to change some defaults new patch: opendkim-2.9.2_default_config.patch - a few more buildrequires: libevent-devel, tre-devel, unbound-devel, erlang- initial packageobs-arm-8 16847552992.11.0-bp155.3.152.11.0-bp155.3.15autobuildautobuildautobuild.conf.sampleautobuildLICENSEautobuild.8.gz/usr/bin//usr/share/doc/packages//usr/share/doc/packages/autobuild//usr/share/licenses//usr/share/licenses/autobuild//usr/share/man/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Backports:SLE-15-SP5/standard/7414f105c75cdfceb5825cf465e376a1-opendkimcpioxz5aarch64-suse-linuxELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=41ec963481bb17704d9306725d92ce5fdb563227, for GNU/Linux 3.7.0, strippeddirectoryASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RRRRRRR'.g2\@1 utf-831c02912ace128aab629f4de09861a0aeeeccc95b47cd2ffb680d35f7522ae87? 7zXZ !t/] crv9w>,sW};RY }9m†n9zeE%'iƑcL;,z$?|y|IXIZyiA(isiMe=̨1 cyR{Ia^{*2[][bmi&q+XB5l\TO;&?) fBT f8w@v(2:d&2?TKzɚ1=eXVS>H>ۑi(sV~ d#naFINKJj`j(L\܈:w6#gjZ;<[c[̘i6ABHWv[P,ՄTWXIkgD۰ LZWI"j* n<5zD##%11~TRXdF$O'(T jٌY WYpIuLQWZ_[l,`hG?Y5RKudP"ҷ%sasؠ|e 3 SIs5y6PIA{?aZ_D}ipgn0x޼AXjӹ`wUn"a'Д/;400ZAp?.[|C5* p)^rm}&e ~6J ❒PϷލ^]&n6Yg<bL ^lo)i8d̶X*R3C16掄iG婎+JB'"L~~ 4GwL-Cm8uv68 fEdL+_:SS]b{8]\4Jt>,BI6oe9vZnq}}ߵ}=AZ[WP>t)'J;.fs[##mѧ_$&DtC,~F8tl$ˎI,U]ɪ$8-*uCzyoE@N~2,%)@+RE7IWDӤԶ s$景xt_ tˋj:$QNNe5h.|{zD]J扦{8\ー ` 4/CNYi41 C@KRR"Y2<)[: \$y@)CqT5^s ,@F1aT PZ%<:d1!fkb]z7l`37~q y#3/p|I%0~&IWY1h_h*c@rj72حV4m eڨyGMaT~F>`zԝLRUX@.z`ʌ٬4ə/v`iԻ]R W>dRmՂ]DJ{VgfCgO ?] hiYsmڜKpD6q52)9Ͻΐ8B7<B T+D1bH| i8z;yq7܁M 2/!೿ʦMJ>è_I X:{Dj4)g7? ^})9 c(1n77_6BjB6ćG;БʒiۇoV%3"I?BL[)ddb&~ymw}O|zшdOehPXMO\3=]$HzpY?4&&w_)ffUAA6ꩲv g3-c-@6S pB i%bUMLVZaᴥ?G|u4oo`1UGOnp+ZU9Gti:8~0O*Hf*yO0B{.x$Yo4u]z:܃%i;r:Y{&LG'˽w$iYصCQ Ed}9W_}>G*7E} =?Kfm 85`NJ$, & a=uRGԙhaMh"8sOCCuDӣF8~P4^Ne!-]_NVl~3Ű`:۠hZ0B2?}<{'e2IYᷮ9B3O ם(di fnљ08r+ ,(wȀN ueꘇm7m >>R%[NVD6g ვa=,RVȝF@gt/Fed!*l nܷ;χ @83T6`rSA]_3sǀ>[!"A41By}Yj%G,F n#:CNvW` Y@)zr(0ϛ/- KCSmƌlҺp*@qӟˎS÷Cf?B4! ;9@c(S+SGDI!'3@4yOq~:P (^" #(IScU@n.kt1!$\B- oaAŸ/2("BL*[jsiPj8lV:@R,YmESSQEBŒ:h!I0^}g][UVam&D#y_^JeFӇ'LSbLg`jA13hnqnJv,AwDnIBĥb\@m.I{_' 섖HХa Uͦ\F#>pA&6wzNbe4A*~H"-/8w{I\/_{:ka \wxF&V_FCYͯʀVmH݊ݽR(m7h^[GJ |k)v7P8,gP EZҋMD;;@QMLyb,~ZbY909h|ƟWRւulA5 ^owQ8+ Zsm$_*R[m䪥J?|3c2߉>ƲkdQYp-/,@Q8+TS!.piW~J_'0Y;9[RYj";rk ڊ T:$'tUڽ1lؼ`^ׄ Ѥ5.c5K^L7 #:#;="=e!G6Чժ,kyt`!̅сN61Z󧲊cNm%:#<~qmfҨ`7EmyLo# ݽNw͐'A4Ve.hWryDm&X_S`+ju"}PcNf1_IJX%gYIV⍗(Z^[<W2:/bEdN}=qƪcMr(ͮs a%C=Yu6f,'^0IōIo Q UJ4HY _Mh9֦TfQc诂e3ee26!,/VǕ4,;nKa1/\,pbME$)8\SCڹQɑӓ1 A/"ЖP0tӘ jO!Q%uikE=>#t1/Fe?p5:F1|X8-h`DJhg bC9OU`C$ Ka׎7/Z qeV~QN`OW 9xeDYQm:O0WZ 'MJgl_EyvN0,*t^9#K YZ