Bug 1479087
Summary: | [RFE] Please upgrade SpamAssassin package to latest upstream version (3.4.1) | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Candace Sheremeta <cshereme> | |
Component: | spamassassin | Assignee: | Ondřej Lysoněk <olysonek> | |
Status: | CLOSED WONTFIX | QA Contact: | qe-baseos-daemons | |
Severity: | medium | Docs Contact: | ||
Priority: | medium | |||
Version: | 7.4 | CC: | cshereme, cww, gscarbor, mvanderw, ovasik, phil, psklenar, shiva, simon.matter, thozza | |
Target Milestone: | rc | Keywords: | FutureFeature, Rebase | |
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | Doc Type: | Enhancement | ||
Doc Text: |
If this bug requires documentation, please select an appropriate Doc Type value.
|
Story Points: | --- | |
Clone Of: | ||||
: | 1664283 (view as bug list) | Environment: | ||
Last Closed: | 2019-01-08 10:26:39 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1477664, 1534569, 1630905 |
Description
Candace Sheremeta
2017-08-07 22:41:32 UTC
Makes sense to change the requested version to 3.4.2 now. Fedora 29 includes a SRPM: https://dl.fedoraproject.org/pub/fedora/linux/development/29/Everything/source/tree/Packages/s/spamassassin-3.4.2-2.fc29.src.rpm I've rebuilt and installed this successfully on CentOS 7.5. The one hitch is that the systemd unit file for 3.4.0 assumes Type=forking and -d is passed to the spamd executable. The Fedora 29 RPM for 3.4.2 assumes Type=simple so the daemonize option in /etc/sysconfig/spamassassin must be removed. I suggest changing the spec file to remove the (replace) from /etc/sysconfig/spamassassin. Development Management has reviewed and declined this request. You may appeal this decision by reopening this request. |