Server IP : 85.214.239.14 / Your IP : 3.147.205.30 Web Server : Apache/2.4.62 (Debian) System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.18 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : OFF | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : OFF Directory : /proc/3/cwd/usr/share/perl5/Mail/DMARC/Report/Aggregate/Record/Auth_Results/ |
Upload File : |
package Mail::DMARC::Report::Aggregate::Record::Auth_Results::SPF; our $VERSION = '1.20211209'; use strict; use Carp; use parent 'Mail::DMARC::Base'; sub new { my ( $class, @args ) = @_; my $self = bless {}, $class; if (0 == scalar @args) { return $self; } # a bare hash return $self->_from_hash(@args) if scalar @args > 1; my $spf = shift @args; return $spf if ref $spf eq $class; return $self->_from_hashref($spf) if 'HASH' eq ref $spf; croak "invalid spf argument"; } sub domain { return $_[0]->{domain} if 1 == scalar @_; return $_[0]->{domain} = $_[1]; } sub result { return $_[0]->{result} if 1 == scalar @_; croak if !$_[0]->is_valid_spf_result( $_[1] ); return $_[0]->{result} = $_[1]; } sub scope { return $_[0]->{scope} if 1 == scalar @_; croak if ! $_[0]->is_valid_spf_scope( $_[1] ); return $_[0]->{scope} = $_[1]; } sub _from_hash { my ($self, %args) = @_; foreach my $key ( keys %args ) { # scope is frequently absent on received reports next if ($key eq 'scope' && !$args{$key}); $self->$key( $args{$key} ); } $self->is_valid; return $self; } sub _from_hashref { return $_[0]->_from_hash(%{ $_[1] }); } sub is_valid { my $self = shift; foreach my $f (qw/ domain result scope /) { next if $self->{$f}; if ($f ne 'scope') { # quite a few DMARC reporters don't include scope warn "SPF $f is required but missing!\n"; } return 0; } if ( $self->{result} =~ /^pass$/i && !$self->{domain} ) { warn "SPF pass MUST include the RFC5321.MailFrom domain!\n"; return 0; } return 1; } 1; __END__ =pod =head1 NAME Mail::DMARC::Report::Aggregate::Record::Auth_Results::SPF - auth_results/spf section of a DMARC aggregate record =head1 VERSION version 1.20211209 =head1 AUTHORS =over 4 =item * Matt Simerson <msimerson@cpan.org> =item * Davide Migliavacca <shari@cpan.org> =item * Marc Bradshaw <marc@marcbradshaw.net> =back =head1 COPYRIGHT AND LICENSE This software is copyright (c) 2021 by Matt Simerson. This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself. =cut