I have been using it for some days now on my server and seems to work as expected. Please approve and add arches if ok for stable. *pypolicyd-spf-0.7.1 (12 Oct 2009) 12 Oct 2009; Daniel Black <dragonheart@gentoo.org> -files/pypolicyd-spf-0.5-etcpath.patch, -pypolicyd-spf-0.6.1.ebuild, +pypolicyd-spf-0.7.1.ebuild: bump and purge Needed dependencies: betelgeuse@pena /usr/portage/mail-filter/pypolicyd-spf $ adjutrix -w x86 mail-filter/pypolicyd-spf Package Version Current Keywords Masks ============================= =================== ================= ========= dev-python/pyspf 2.0.5 ~x86 K
upstream has been stable for a while with no bug reports. Nice and simple script. Thanks Petteri for the test. packages: dev-python/pyspf-2.0.5 mail-filter/pypolicyd-spf-0.7.1 target amd64 x86 to test: run /usr/bin/policyd-spf enter the following text followed by a blank line: recipient=me@example.com request=smtpd_access_policy client_address=213.154.225.229 sender=foo@lists.cacert.org helo_name=lists.cacert.org The following will be displayed: action=550 Message rejected due to: SPF fail - not authorized. Please see http://www.openspf.org/Why?s=helo;id=lists.cacert.org;ip=213.154.225.229;r=me@example.com Now try: recipient=me@example.com request=smtpd_access_policy client_address=213.154.225.228 sender=foo@lists.cacert.org helo_name=lists.cacert.org response: action=prepend Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=213.154.225.228; helo=lists.cacert.org; envelope-from=foo@lists.cacert.org; receiver=me@example.com yay - it works :-)
amd64/x86 stable, all arches done.