summaryrefslogtreecommitdiff
path: root/mail/py-policyd-spf
diff options
context:
space:
mode:
authorwiz <wiz>2017-02-25 17:43:39 +0000
committerwiz <wiz>2017-02-25 17:43:39 +0000
commitedfb0a368a7fa547158a4427118ce5814a78a2c1 (patch)
tree91b3583e4b3fc263de8a634d5179ecd38b89646d /mail/py-policyd-spf
parent5ef52616eb36737b8812fd86d46b460637cd33c8 (diff)
downloadpkgsrc-edfb0a368a7fa547158a4427118ce5814a78a2c1.tar.gz
Updated py-policyd-spf to 2.0.1.
Mark as not supportin python-2.x per the 2.0.0 release notes (see below). --- 2.0.1 (2016-12-08) * Man page formatting and spelling corrections * Corrected default debug level (LP: #1647089) * Amplified loging level '-1' description * Forward port version 1.3.2 fixes for detection of missing Authserv_Id that were inadvertently not brought back to trunk --- 2.0.0 (2016-12-02) ! No longer python2 compatible, minimum python3 version is 3.3 for ipaddress ! Removed support for use of ipaddr ! Changed default for HELO checking from SPF_Not_Pass to Fail (same as MailFrom) even though I think Not Pass makes more sense in order to still the complaints (Fedora, you can drop your sed call in the spec file now). (LP: #1571144) ! Changed default for Authserv-ID to use local hostname to provide a reasonable default Authserv-ID. (LP: #1575608) ! Increased minimum pyspf (python-spf) version to 2.0.9 so that Void_Limit is always available and used. ! Added new Hide_Receiver option to prevent accidental disclosure of BCC receivers and enabled it by default to maximize privacy. (LP: #1394294) ! Changed the name of the defaultSeedOnly option to TestOnly. The previous name is still accepted, but an error is logged. The old name is a legacy from the greylising functionaliy in tumgreyspf (from which this was forked in 2007). The new name better reflects what the option does. + Added new Reason_Message option to allow for custom reject/defer message (LP: #1422324) - Thanks to Bastian Blank for the significant patch + Added support for RFC 7372 email authentication specific enhanced status codes as well as an option to use standard Postfix codes instead + Added new HELO_Whitelist option to allow for whitelisting from SPF checks based on specific HELO/EHLO names (LP: #1602761) + Added new Whitelist_Lookup_Time to allow for adjustments on the maximum time allowed for whitelist related DNS lookups to complete - This should also help with LP: #1622137 + Refactored and extended per user configuration to work for more configuration options + Added new 'None' option for Header_Type. When set, no header field of any kind is added to the message (LP: #1531724) + Added new Mock option for enhanced interoperability with downstream milters - See policyd-spf.conf.5 for details * Fix additional cases of choking on invalid email addresses (LP: #1342105) * Reviewed and refactored logging to provide logging details at various detail levels more consistent with the documentation. Also added a new log level, '-1' for completely silent running. * Added a new PERFORMANCE CONSIDERATIONS section to policyd-spf.1. * Fix python3 incompatibility in cases where HELO name is somehow missing (LP: #1184102) * Improved per-user settings processing to avoid issues with multiple or incorrect header fields being appended to multi-recipient messages * Refactored processing for the No_Mail option to use the pyspf cache from the previous SPF query rather than a new DNS lookup - should help with LP: #1622137 * Fixed an issue that may have caused issues with multi-recipient use of restriction classes * Fixed a typo in policyd-spf-peruser.5 that made the example configuration file invalid
Diffstat (limited to 'mail/py-policyd-spf')
-rw-r--r--mail/py-policyd-spf/Makefile11
-rw-r--r--mail/py-policyd-spf/distinfo10
2 files changed, 10 insertions, 11 deletions
diff --git a/mail/py-policyd-spf/Makefile b/mail/py-policyd-spf/Makefile
index 7391dc24289..9dde80997d1 100644
--- a/mail/py-policyd-spf/Makefile
+++ b/mail/py-policyd-spf/Makefile
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.1 2016/10/27 12:30:23 jperkin Exp $
+# $NetBSD: Makefile,v 1.2 2017/02/25 17:43:39 wiz Exp $
-VERSION= 1.3.2
+VERSION= 2.0.1
DISTNAME= pypolicyd-spf-${VERSION}
PKGNAME= ${PYPKGPREFIX}-policyd-spf-${VERSION}
CATEGORIES= mail python
@@ -11,11 +11,10 @@ HOMEPAGE= https://pypi.python.org/pypi/pypolicyd-spf
COMMENT= Python based policy daemon for Postfix SPF checking
LICENSE= apache-2.0
-DEPENDS+= ${PYPKGPREFIX}-ipaddr>0:../../devel/py-ipaddr
-DEPENDS+= ${PYPKGPREFIX}-authres>0:../../mail/py-authres
-DEPENDS+= ${PYPKGPREFIX}-spf>0:../../mail/py-spf
+DEPENDS+= ${PYPKGPREFIX}-authres-[0-9]*:../../mail/py-authres
+DEPENDS+= ${PYPKGPREFIX}-spf>=2.0.9:../../mail/py-spf
-PYTHON_VERSIONS_ACCEPTED= 27 # py-ipaddr, py-spf
+PYTHON_VERSIONS_INCOMPATIBLE= 27
DOCDIR= share/doc/${PKGBASE}
EGDIR= ${PREFIX}/share/examples/${PKGBASE}
diff --git a/mail/py-policyd-spf/distinfo b/mail/py-policyd-spf/distinfo
index 549f9598083..9e4c08ada5e 100644
--- a/mail/py-policyd-spf/distinfo
+++ b/mail/py-policyd-spf/distinfo
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.1 2016/10/27 12:30:23 jperkin Exp $
+$NetBSD: distinfo,v 1.2 2017/02/25 17:43:39 wiz Exp $
-SHA1 (pypolicyd-spf-1.3.2.tar.gz) = 607d3a7df6d6c5d19edd7c337ba2e0c143ff3499
-RMD160 (pypolicyd-spf-1.3.2.tar.gz) = ce85a3201990f9b57eb21e8f02b666a5987e6bbd
-SHA512 (pypolicyd-spf-1.3.2.tar.gz) = e80b13a0cf9f8406592db5edcb9770051352b3f637d4d9d5bd96295710bf3728a8350c0697e5b430698b0d9d226c83c9decb67923ed5cdb3502ee15509715af4
-Size (pypolicyd-spf-1.3.2.tar.gz) = 32973 bytes
+SHA1 (pypolicyd-spf-2.0.1.tar.gz) = 8506aa1bde24e7a93372500a51a30a260dc36259
+RMD160 (pypolicyd-spf-2.0.1.tar.gz) = 251bb577c6d8acc4f184efbd9752b6e53443870d
+SHA512 (pypolicyd-spf-2.0.1.tar.gz) = 85f51491ab1f44e197dbf9a15f9e723ba3aaf0472d9d1653595490d7211670a67cdca5699111ab5a29f9d919cd935ed58d8d70bd1312a4f0f90da4ef26a50509
+Size (pypolicyd-spf-2.0.1.tar.gz) = 38086 bytes
SHA1 (patch-policyd-spf) = 43a3ac8491d6120e26c994d696c4143adf0749bc
SHA1 (patch-policyd-spf.1) = 21363210a9e45978074bc1f59c545c85e5181d7e
SHA1 (patch-policyd-spf.conf.5) = fa549a2dd726f6a5894c2c4e494136d9860624fb