depot/third_party/nixpkgs/pkgs/tools/networking/decode-spam-headers/default.nix
Default email 587713944a Project import generated by Copybara.
GitOrigin-RevId: 6143fc5eeb9c4f00163267708e26191d1e918932
2024-04-21 17:54:59 +02:00

59 lines
1.8 KiB
Nix

{ lib, stdenv, fetchFromGitHub, python3Packages }:
python3Packages.buildPythonApplication rec {
pname = "decode-spam-headers";
version = "2022-09-22-unreleased";
src = fetchFromGitHub {
owner = "mgeeky";
repo = "decode-spam-headers";
rev = "492b6e744475cd5d3dd68a8140bc3478244b7df1";
sha256 = "sha256-gBDkvlZCndQjochn6TZtM/Lanza64LqMjNnLjn+pPR4=";
};
format = "other";
outputs = [ "out" "doc" ];
installPhase = ''
install -D decode-spam-headers.py $out/bin/decode-spam-headers
mkdir -p $doc/share/doc/${pname}
mv \
README.md \
img/ \
$doc/share/doc/${pname}
'';
propagatedBuildInputs = [
python3Packages.python-dateutil
python3Packages.tldextract
python3Packages.packaging
python3Packages.dnspython
python3Packages.requests
python3Packages.colorama
];
meta = with lib; {
homepage = "https://github.com/mgeeky/decode-spam-headers/";
description = "A script that helps you understand why your E-Mail ended up in Spam";
mainProgram = "decode-spam-headers";
longDescription = ''
Whether you are trying to understand why a specific e-mail ended up in
SPAM/Junk for your daily Administrative duties or for your Red-Team
Phishing simulation purposes, this script is there for you to help!
This tool accepts on input an *.EML or *.txt file with all the SMTP
headers. It will then extract a subset of interesting headers and using
105+ tests will attempt to decode them as much as possible.
This script also extracts all IPv4 addresses and domain names and performs
full DNS resolution of them.
Resulting output will contain useful information on why this e-mail might
have been blocked.
'';
license = licenses.mit;
maintainers = with maintainers; [ ];
};
}