head 1.4; access; symbols pkgsrc-2023Q4:1.4.0.6 pkgsrc-2023Q4-base:1.4 pkgsrc-2023Q3:1.4.0.4 pkgsrc-2023Q3-base:1.4 pkgsrc-2023Q2:1.4.0.2 pkgsrc-2023Q2-base:1.4 pkgsrc-2023Q1:1.3.0.12 pkgsrc-2023Q1-base:1.3 pkgsrc-2022Q4:1.3.0.10 pkgsrc-2022Q4-base:1.3 pkgsrc-2022Q3:1.3.0.8 pkgsrc-2022Q3-base:1.3 pkgsrc-2022Q2:1.3.0.6 pkgsrc-2022Q2-base:1.3 pkgsrc-2022Q1:1.3.0.4 pkgsrc-2022Q1-base:1.3 pkgsrc-2021Q4:1.3.0.2 pkgsrc-2021Q4-base:1.3 pkgsrc-2021Q3:1.1.0.36 pkgsrc-2021Q3-base:1.1 pkgsrc-2021Q2:1.1.0.34 pkgsrc-2021Q2-base:1.1 pkgsrc-2021Q1:1.1.0.32 pkgsrc-2021Q1-base:1.1 pkgsrc-2020Q4:1.1.0.30 pkgsrc-2020Q4-base:1.1 pkgsrc-2020Q3:1.1.0.28 pkgsrc-2020Q3-base:1.1 pkgsrc-2020Q2:1.1.0.24 pkgsrc-2020Q2-base:1.1 pkgsrc-2020Q1:1.1.0.4 pkgsrc-2020Q1-base:1.1 pkgsrc-2019Q4:1.1.0.26 pkgsrc-2019Q4-base:1.1 pkgsrc-2019Q3:1.1.0.22 pkgsrc-2019Q3-base:1.1 pkgsrc-2019Q2:1.1.0.20 pkgsrc-2019Q2-base:1.1 pkgsrc-2019Q1:1.1.0.18 pkgsrc-2019Q1-base:1.1 pkgsrc-2018Q4:1.1.0.16 pkgsrc-2018Q4-base:1.1 pkgsrc-2018Q3:1.1.0.14 pkgsrc-2018Q3-base:1.1 pkgsrc-2018Q2:1.1.0.12 pkgsrc-2018Q2-base:1.1 pkgsrc-2018Q1:1.1.0.10 pkgsrc-2018Q1-base:1.1 pkgsrc-2017Q4:1.1.0.8 pkgsrc-2017Q4-base:1.1 pkgsrc-2017Q3:1.1.0.6 pkgsrc-2017Q3-base:1.1 pkgsrc-2017Q2:1.1.0.2 pkgsrc-2017Q2-base:1.1; locks; strict; comment @# @; 1.4 date 2023.05.08.20.35.35; author markd; state Exp; branches; next 1.3; commitid NgDVC7nKFqAWvcoE; 1.3 date 2021.10.26.10.54.23; author nia; state Exp; branches; next 1.2; commitid 4oqMIfLoj7jhgjeD; 1.2 date 2021.10.07.14.25.40; author nia; state Exp; branches; next 1.1; commitid qxYyTRMxdIO13TbD; 1.1 date 2017.04.25.20.17.03; author fhajny; state Exp; branches; next ; commitid 24Znn5DEdF29gXOz; desc @@ 1.4 log @py-flufl.bounce: update to 4.0 4.0 (2021-06-16) Added another string to the stop looking strings in the yahoo detector. Detectors are now run in a defined order and stop on the first detection. 3.0.2 (2021-02-09) Fixed microsoft.py which has been broken forever. Added recognition for yet another non-complaint Yahoo DSN. Added recognition for a non-compliant DSN from an unknown MTA. Fixed missing () in the groupwise detector. 3.0.1 (2020-01-17) Added recognition for a non-compliant opensmtpd DSN with Action: error. Caught a possible UnicodeEncodeError in simplematch.py. Fixed simplmatch.py to not return results that don’t resemble email addresses. @ text @$NetBSD: distinfo,v 1.3 2021/10/26 10:54:23 nia Exp $ BLAKE2s (flufl.bounce-4.0.tar.gz) = f535b1dc8285b5f76ff19f038f29eccca2c54c3be63b0f3a5b4735787e00c082 SHA512 (flufl.bounce-4.0.tar.gz) = c6dd8cf2f4f0ea7c8698054042dfc9da3bd1a2d9cae082e01a0be9c39018fefba07154e2c9c15b1a00c896e58bb0a6d2063a3c067bec6b464d201bb7b3220e9e Size (flufl.bounce-4.0.tar.gz) = 108623 bytes @ 1.3 log @mail: Replace RMD160 checksums with BLAKE2s checksums All checksums have been double-checked against existing RMD160 and SHA512 hashes The following distfiles were unfetchable (possibly fetched conditionally?): ./mail/qmail/distinfo netqmail-1.05-TAI-leapsecs.patch @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.2 2021/10/07 14:25:40 nia Exp $ d3 3 a5 3 BLAKE2s (flufl.bounce-3.0.tar.gz) = 5bc1d516937f6da63d3d23979875c9db8730cdcb68b37443534abc9e69b7339f SHA512 (flufl.bounce-3.0.tar.gz) = f6effe38c80e1e5e1119d7951a1a32bb9b91fc52db0887eee4ebb74e005ad5cf48351311985a3169649301efe9273d3fe480b3dded7eff3b77b73312d0416f45 Size (flufl.bounce-3.0.tar.gz) = 89156 bytes @ 1.2 log @mail: Remove SHA1 hashes for distfiles @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.1 2017/04/25 20:17:03 fhajny Exp $ d3 1 a3 1 RMD160 (flufl.bounce-3.0.tar.gz) = e62dcf28d3aed13ff6e5ba0adf37a8cd2a2fc441 @ 1.1 log @Import flufl.bounce 3.0 as mail/py-flufl.bounce. The flufl.bounce library provides a set of heuristics and an API for detecting the original bouncing email addresses from a bounce message. Many formats found in the wild are supported, as are VERP and RFC 3464 (DSN). @ text @d1 1 a1 1 $NetBSD$ a2 1 SHA1 (flufl.bounce-3.0.tar.gz) = e62a3b8d211d24e23dc2ae6a1258aee87014cf85 @