9c6729729b
2.0.2 (2017-12-14) * Fix treatment of No_Mail configuration parameter so that specifying No_Mail = False (the default) does not cause incorrect results * Conditionally import authres is Header_Type is AR and raise an error if it is missing (sorry pep-8) to avoid cases where users change the config and suddenly it doesn't work for an example, see: https://bugzilla.redhat.com/show_bug.cgi?id=1208876 * Update and correct Mail_From_pass_restriction description in policyd-spf.conf(5 () * Update HELO checking default option in policyd-spf.conf(5) * Note that SPF_Not_Pass is not consistent with RFC 7208 in the HELO checking section of policyd-spf.conf(5) - already documented for Mail From
11 lines
783 B
Text
11 lines
783 B
Text
$NetBSD: distinfo,v 1.3 2018/02/22 10:27:00 adam Exp $
|
|
|
|
SHA1 (pypolicyd-spf-2.0.2.tar.gz) = 58cd401a2b28a2784ed4645b927336ac439ae761
|
|
RMD160 (pypolicyd-spf-2.0.2.tar.gz) = 389b979ada83cd8ec49794ff895a71085afda59f
|
|
SHA512 (pypolicyd-spf-2.0.2.tar.gz) = adcc7b30c6922894f9407edd0637b02a138623f4480ec37635475396826b457c835b3ffb599d1985e306770fe5f72404552ed705bd957e63b5c54ca3d8991673
|
|
Size (pypolicyd-spf-2.0.2.tar.gz) = 38546 bytes
|
|
SHA1 (patch-policyd-spf) = 43a3ac8491d6120e26c994d696c4143adf0749bc
|
|
SHA1 (patch-policyd-spf.1) = 21363210a9e45978074bc1f59c545c85e5181d7e
|
|
SHA1 (patch-policyd-spf.conf.5) = fa549a2dd726f6a5894c2c4e494136d9860624fb
|
|
SHA1 (patch-policyd-spf.peruser.5) = e3e831a41254b58b04649f9a6ecfe5df22568135
|
|
SHA1 (patch-setup.py) = f0e60162372248595f508ea921c8ccc4d151459c
|