spf 0.0.45 → 0.0.46

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,15 +1,15 @@
1
1
  ---
2
2
  !binary "U0hBMQ==":
3
3
  metadata.gz: !binary |-
4
- YjU3ODliNGE0MGViNTE1OTQ4ODQ3ZGViODI4ZWU3NjdkYjc4Mjg2Yg==
4
+ OTU2NzZlNmViOGYxMWE1Nzg2YzRiMGFiOGM4YjJiYzE5MGRhNDM5Mw==
5
5
  data.tar.gz: !binary |-
6
- MWRmNWY3NWM0OTgzMGFjNjg2MWRjNjJmNDFhOTk3ZTgyOTQ4M2I4MQ==
6
+ ZDA4MDY2YzNhNDNlMjFkMTY4ZTRmOTJmY2E5ZjUyMGNiZTE0ZDU0ZA==
7
7
  SHA512:
8
8
  metadata.gz: !binary |-
9
- NjUzMDgxYjViMjc3OGI3NWY5YzBlOWFkOTQ0YWU4MzkwOTRiZGMzNzU0YjAw
10
- YjViMmYyMmZhNGRhMmNiYjY2NTJlYmYwMWFhOWVmODNhMTFmMTE0MTVlYjI2
11
- NGIxNGQzZmQ0OTdhOWU5ODIyNjM5YTI2NmNhMDU4ZjQ2YTM0OWY=
9
+ YzYxNTFhNGU1MGU3NTAxYjAzMzhiMTgwNDExOWVjYzgyNjgyYjc0Y2JmOWYw
10
+ NDU2NDUxYTYyYTJjMmE5MDQxYmMwZWE5NDE4Mjc5MDc1M2Q5NmYwNTY5YTg1
11
+ M2M5ZjNlYzA5NmRiMjkyNjEyMjEzZmEzNmM4NzIzYWM2NDVlYTc=
12
12
  data.tar.gz: !binary |-
13
- ODc2M2RmYzQ4ZTJiY2EyNjQyMGMwZjExZjFmMDc1MmU4NjQ0NjE5ZmFjZDcz
14
- NWQzNDQ1ODM0YTRiZmRhMjdiYmFkYjVmNmY0YmQxYWYyMTcyZjUxYmI4NTNh
15
- N2Q5MTdiNzU5MjM2ZWJjZmQ4NmE5MzM3NGUyNDJiNDRiOTQ0ZWE=
13
+ OTI4ODQ3NDEyNWMzOWQ5ZmM2MDdmYWJjN2Y4YTg2NTkwODZiMzBlNjk1ODdl
14
+ MDdiYzJjNDdhZDk1OTE2MTExYTNjNzYwYTRkNmUyMzU1OWUzMTA2MWUxMDhm
15
+ YTNmMTQzOWI0MWVjNDg5ZGM4YjA4YTczMWQ5YmFiYzY3ZTQ5ODE=
@@ -86,7 +86,7 @@ class SPF::Server
86
86
  end
87
87
 
88
88
  def throw_result(name, request, text)
89
- raise self.result_class(name).new(self, request, text)
89
+ raise self.result_class(name).new([self, request, text])
90
90
  end
91
91
 
92
92
  def process(request)
@@ -139,7 +139,7 @@ class SPF::Server
139
139
  end
140
140
 
141
141
  rr_type = self.resource_typeclass_for_rr_type(rr_type)
142
-
142
+
143
143
  domain = domain.sub(/\.$/, '').downcase
144
144
 
145
145
  packet = nil
@@ -218,7 +218,7 @@ class SPF::Server
218
218
  # Implication: Sender ID processing may make use of existing TXT-
219
219
  # type records where a result of "None" would normally be returned
220
220
  # under a strict interpretation of RFC 4406.
221
-
221
+
222
222
  begin
223
223
  query_count += 1
224
224
  packet = self.dns_lookup(domain, 'TXT')
@@ -558,7 +558,7 @@ class SPF::Mech < SPF::Term
558
558
  SPF::Result::SoftFail === result or
559
559
  SPF::Result::Neutral === result
560
560
 
561
- server.throw_result('permerror', request,
561
+ server.throw_result(:permerror, request,
562
562
  "Include domain '#{authority_domain}' has no applicable sender policy") if
563
563
  SPF::Result::None === result
564
564
 
@@ -1,6 +1,6 @@
1
1
  # encoding: ASCII-8BIT
2
2
  module SPF
3
- VERSION = '0.0.45'
3
+ VERSION = '0.0.46'
4
4
  end
5
5
 
6
6
  # vim:sw=2 sts=2
@@ -5,7 +5,7 @@
5
5
 
6
6
  Gem::Specification.new do |s|
7
7
  s.name = "spf"
8
- s.version = "0.0.45"
8
+ s.version = "0.0.46"
9
9
 
10
10
  s.required_rubygems_version = Gem::Requirement.new(">= 0") if s.respond_to? :required_rubygems_version=
11
11
  s.authors = ["Andrew Flury", "Julian Mehnle", "Jacob Rideout"]
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: spf
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.0.45
4
+ version: 0.0.46
5
5
  platform: ruby
6
6
  authors:
7
7
  - Andrew Flury