depot/third_party/nixpkgs/pkgs/tools/networking/decode-spam-headers/default.nix
Default email bcb2f287e1 Project import generated by Copybara.
GitOrigin-RevId: d603719ec6e294f034936c0d0dc06f689d91b6c3
2024-06-20 20:27:18 +05:30

59 lines
1.8 KiB
Nix

{ lib, stdenv, fetchFromGitHub, python3Packages }:
python3Packages.buildPythonApplication rec {
pname = "decode-spam-headers";
version = "2022-09-22-unreleased";
src = fetchFromGitHub {
owner = "mgeeky";
repo = "decode-spam-headers";
rev = "492b6e744475cd5d3dd68a8140bc3478244b7df1";
sha256 = "sha256-gBDkvlZCndQjochn6TZtM/Lanza64LqMjNnLjn+pPR4=";
};
format = "other";
outputs = [ "out" "doc" ];
installPhase = ''
install -D decode-spam-headers.py $out/bin/decode-spam-headers
mkdir -p $doc/share/doc/${pname}
mv \
README.md \
img/ \
$doc/share/doc/${pname}
'';
propagatedBuildInputs = [
python3Packages.python-dateutil
python3Packages.tldextract
python3Packages.packaging
python3Packages.dnspython
python3Packages.requests
python3Packages.colorama
];
meta = with lib; {
homepage = "https://github.com/mgeeky/decode-spam-headers/";
description = "Script that helps you understand why your E-Mail ended up in Spam";
mainProgram = "decode-spam-headers";
longDescription = ''
Whether you are trying to understand why a specific e-mail ended up in
SPAM/Junk for your daily Administrative duties or for your Red-Team
Phishing simulation purposes, this script is there for you to help!
This tool accepts on input an *.EML or *.txt file with all the SMTP
headers. It will then extract a subset of interesting headers and using
105+ tests will attempt to decode them as much as possible.
This script also extracts all IPv4 addresses and domain names and performs
full DNS resolution of them.
Resulting output will contain useful information on why this e-mail might
have been blocked.
'';
license = licenses.mit;
maintainers = with maintainers; [ ];
};
}