head 1.5; access; symbols pkgsrc-2023Q4:1.5.0.18 pkgsrc-2023Q4-base:1.5 pkgsrc-2023Q3:1.5.0.16 pkgsrc-2023Q3-base:1.5 pkgsrc-2023Q2:1.5.0.14 pkgsrc-2023Q2-base:1.5 pkgsrc-2023Q1:1.5.0.12 pkgsrc-2023Q1-base:1.5 pkgsrc-2022Q4:1.5.0.10 pkgsrc-2022Q4-base:1.5 pkgsrc-2022Q3:1.5.0.8 pkgsrc-2022Q3-base:1.5 pkgsrc-2022Q2:1.5.0.6 pkgsrc-2022Q2-base:1.5 pkgsrc-2022Q1:1.5.0.4 pkgsrc-2022Q1-base:1.5 pkgsrc-2021Q4:1.5.0.2 pkgsrc-2021Q4-base:1.5 pkgsrc-2021Q3:1.3.0.30 pkgsrc-2021Q3-base:1.3 pkgsrc-2021Q2:1.3.0.28 pkgsrc-2021Q2-base:1.3 pkgsrc-2021Q1:1.3.0.26 pkgsrc-2021Q1-base:1.3 pkgsrc-2020Q4:1.3.0.24 pkgsrc-2020Q4-base:1.3 pkgsrc-2020Q3:1.3.0.22 pkgsrc-2020Q3-base:1.3 pkgsrc-2020Q2:1.3.0.20 pkgsrc-2020Q2-base:1.3 pkgsrc-2020Q1:1.3.0.16 pkgsrc-2020Q1-base:1.3 pkgsrc-2019Q4:1.3.0.18 pkgsrc-2019Q4-base:1.3 pkgsrc-2019Q3:1.3.0.14 pkgsrc-2019Q3-base:1.3 pkgsrc-2019Q2:1.3.0.12 pkgsrc-2019Q2-base:1.3 pkgsrc-2019Q1:1.3.0.10 pkgsrc-2019Q1-base:1.3 pkgsrc-2018Q4:1.3.0.8 pkgsrc-2018Q4-base:1.3 pkgsrc-2018Q3:1.3.0.6 pkgsrc-2018Q3-base:1.3 pkgsrc-2018Q2:1.3.0.4 pkgsrc-2018Q2-base:1.3 pkgsrc-2018Q1:1.3.0.2 pkgsrc-2018Q1-base:1.3 pkgsrc-2017Q4:1.2.0.10 pkgsrc-2017Q4-base:1.2 pkgsrc-2017Q3:1.2.0.8 pkgsrc-2017Q3-base:1.2 pkgsrc-2017Q2:1.2.0.4 pkgsrc-2017Q2-base:1.2 pkgsrc-2017Q1:1.2.0.2 pkgsrc-2017Q1-base:1.2 pkgsrc-2016Q4:1.1.0.2 pkgsrc-2016Q4-base:1.1; locks; strict; comment @# @; 1.5 date 2021.10.26.10.54.23; author nia; state Exp; branches; next 1.4; commitid 4oqMIfLoj7jhgjeD; 1.4 date 2021.10.07.14.25.41; author nia; state Exp; branches; next 1.3; commitid qxYyTRMxdIO13TbD; 1.3 date 2018.02.22.10.27.00; author adam; state Exp; branches; next 1.2; commitid ekGMbfEqL0OJfQrA; 1.2 date 2017.02.25.17.43.39; author wiz; state Exp; branches; next 1.1; commitid lH4rBC6WrQcdimHz; 1.1 date 2016.10.27.12.30.23; author jperkin; state Exp; branches; next ; commitid jfp8sTSEqTgpsMrz; desc @@ 1.5 log @mail: Replace RMD160 checksums with BLAKE2s checksums All checksums have been double-checked against existing RMD160 and SHA512 hashes The following distfiles were unfetchable (possibly fetched conditionally?): ./mail/qmail/distinfo netqmail-1.05-TAI-leapsecs.patch @ text @$NetBSD: distinfo,v 1.4 2021/10/07 14:25:41 nia Exp $ BLAKE2s (pypolicyd-spf-2.0.2.tar.gz) = 37f05ec6a7424d6cf45ff756f1e43e7422ebf50b5f28244868b503ab6fe95f41 SHA512 (pypolicyd-spf-2.0.2.tar.gz) = adcc7b30c6922894f9407edd0637b02a138623f4480ec37635475396826b457c835b3ffb599d1985e306770fe5f72404552ed705bd957e63b5c54ca3d8991673 Size (pypolicyd-spf-2.0.2.tar.gz) = 38546 bytes SHA1 (patch-policyd-spf) = 43a3ac8491d6120e26c994d696c4143adf0749bc SHA1 (patch-policyd-spf.1) = 21363210a9e45978074bc1f59c545c85e5181d7e SHA1 (patch-policyd-spf.conf.5) = fa549a2dd726f6a5894c2c4e494136d9860624fb SHA1 (patch-policyd-spf.peruser.5) = e3e831a41254b58b04649f9a6ecfe5df22568135 SHA1 (patch-setup.py) = f0e60162372248595f508ea921c8ccc4d151459c @ 1.4 log @mail: Remove SHA1 hashes for distfiles @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.3 2018/02/22 10:27:00 adam Exp $ d3 1 a3 1 RMD160 (pypolicyd-spf-2.0.2.tar.gz) = 389b979ada83cd8ec49794ff895a71085afda59f @ 1.3 log @py-policyd-spf: updated to 2.0.2 2.0.2 (2017-12-14) * Fix treatment of No_Mail configuration parameter so that specifying No_Mail = False (the default) does not cause incorrect results * Conditionally import authres is Header_Type is AR and raise an error if it is missing (sorry pep-8) to avoid cases where users change the config and suddenly it doesn't work for an example, see: https://bugzilla.redhat.com/show_bug.cgi?id=1208876 * Update and correct Mail_From_pass_restriction description in policyd-spf.conf(5 () * Update HELO checking default option in policyd-spf.conf(5) * Note that SPF_Not_Pass is not consistent with RFC 7208 in the HELO checking section of policyd-spf.conf(5) - already documented for Mail From @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.2 2017/02/25 17:43:39 wiz Exp $ a2 1 SHA1 (pypolicyd-spf-2.0.2.tar.gz) = 58cd401a2b28a2784ed4645b927336ac439ae761 @ 1.2 log @Updated py-policyd-spf to 2.0.1. Mark as not supportin python-2.x per the 2.0.0 release notes (see below). --- 2.0.1 (2016-12-08) * Man page formatting and spelling corrections * Corrected default debug level (LP: #1647089) * Amplified loging level '-1' description * Forward port version 1.3.2 fixes for detection of missing Authserv_Id that were inadvertently not brought back to trunk --- 2.0.0 (2016-12-02) ! No longer python2 compatible, minimum python3 version is 3.3 for ipaddress ! Removed support for use of ipaddr ! Changed default for HELO checking from SPF_Not_Pass to Fail (same as MailFrom) even though I think Not Pass makes more sense in order to still the complaints (Fedora, you can drop your sed call in the spec file now). (LP: #1571144) ! Changed default for Authserv-ID to use local hostname to provide a reasonable default Authserv-ID. (LP: #1575608) ! Increased minimum pyspf (python-spf) version to 2.0.9 so that Void_Limit is always available and used. ! Added new Hide_Receiver option to prevent accidental disclosure of BCC receivers and enabled it by default to maximize privacy. (LP: #1394294) ! Changed the name of the defaultSeedOnly option to TestOnly. The previous name is still accepted, but an error is logged. The old name is a legacy from the greylising functionaliy in tumgreyspf (from which this was forked in 2007). The new name better reflects what the option does. + Added new Reason_Message option to allow for custom reject/defer message (LP: #1422324) - Thanks to Bastian Blank for the significant patch + Added support for RFC 7372 email authentication specific enhanced status codes as well as an option to use standard Postfix codes instead + Added new HELO_Whitelist option to allow for whitelisting from SPF checks based on specific HELO/EHLO names (LP: #1602761) + Added new Whitelist_Lookup_Time to allow for adjustments on the maximum time allowed for whitelist related DNS lookups to complete - This should also help with LP: #1622137 + Refactored and extended per user configuration to work for more configuration options + Added new 'None' option for Header_Type. When set, no header field of any kind is added to the message (LP: #1531724) + Added new Mock option for enhanced interoperability with downstream milters - See policyd-spf.conf.5 for details * Fix additional cases of choking on invalid email addresses (LP: #1342105) * Reviewed and refactored logging to provide logging details at various detail levels more consistent with the documentation. Also added a new log level, '-1' for completely silent running. * Added a new PERFORMANCE CONSIDERATIONS section to policyd-spf.1. * Fix python3 incompatibility in cases where HELO name is somehow missing (LP: #1184102) * Improved per-user settings processing to avoid issues with multiple or incorrect header fields being appended to multi-recipient messages * Refactored processing for the No_Mail option to use the pyspf cache from the previous SPF query rather than a new DNS lookup - should help with LP: #1622137 * Fixed an issue that may have caused issues with multi-recipient use of restriction classes * Fixed a typo in policyd-spf-peruser.5 that made the example configuration file invalid @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.1 2016/10/27 12:30:23 jperkin Exp $ d3 4 a6 4 SHA1 (pypolicyd-spf-2.0.1.tar.gz) = 8506aa1bde24e7a93372500a51a30a260dc36259 RMD160 (pypolicyd-spf-2.0.1.tar.gz) = 251bb577c6d8acc4f184efbd9752b6e53443870d SHA512 (pypolicyd-spf-2.0.1.tar.gz) = 85f51491ab1f44e197dbf9a15f9e723ba3aaf0472d9d1653595490d7211670a67cdca5699111ab5a29f9d919cd935ed58d8d70bd1312a4f0f90da4ef26a50509 Size (pypolicyd-spf-2.0.1.tar.gz) = 38086 bytes @ 1.1 log @Import pypolicyd-spf version 1.3.2 as mail/py-policyd-spf. This is python-policyd-spf, an external policy checker for the postfix mail server. It will use pyspf to check SPF records to determine if email should be rejected by your server. Based on https://github.com/joyent/pkgsrc/pull/421 by Coy Hile. @ text @d1 1 a1 1 $NetBSD$ d3 4 a6 4 SHA1 (pypolicyd-spf-1.3.2.tar.gz) = 607d3a7df6d6c5d19edd7c337ba2e0c143ff3499 RMD160 (pypolicyd-spf-1.3.2.tar.gz) = ce85a3201990f9b57eb21e8f02b666a5987e6bbd SHA512 (pypolicyd-spf-1.3.2.tar.gz) = e80b13a0cf9f8406592db5edcb9770051352b3f637d4d9d5bd96295710bf3728a8350c0697e5b430698b0d9d226c83c9decb67923ed5cdb3502ee15509715af4 Size (pypolicyd-spf-1.3.2.tar.gz) = 32973 bytes @