Parsedmarc

Latest version: v8.11.0

Safety actively analyzes 629811 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 18 of 26

4.3.1

-----

- Fix parsing of some emails
- Fix duplicate forensic report search for Elasticsearch

4.3.0

-----

- Fix bug where `parsedmarc` would always try to save to Elastic search,
even if only `--hec` was used
- Add options to save reports as a Kafka topic (mikesiegel - 21)
- Major refactoring of functions
- Support parsing forensic reports generated by Brightmail
- Make `sample_headers_only` flag more reliable
- Functions that might be useful to other projects are now stored in
`parsedmarc.utils`:
- `get_base_domain(domain)`
- `get_filename_safe_string(string)`
- `get_ip_address_country(ip_address)`
- `get_ip_address_info(ip_address, nameservers=None, timeout=2.0)`
- `get_reverse_dns(ip_address, nameservers=None, timeout=2.0)`
- `human_timestamp_to_datetime(human_timestamp)`
- `human_timestamp_to_timestamp(human_timestamp)`
- `parse_email(data)`

4.2.0

------

- Save each aggregate report record as a separate Splunk event
- Fix IMAP delete action (20)
- Suppress Splunk SSL validation warnings
- Change default logging level to `WARNING`

4.1.9

-----

- Workaround for forensic/ruf reports that are missing `Arrival-Date` and/or
`Reported-Domain`

4.1.8

-----

- Be more forgiving of weird XML

4.1.7

-----

- Remove any invalid XML schema tags before parsing the XML (18)

Page 18 of 26

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.