Eml-parser

Latest version: v2.0.0

Safety actively analyzes 682404 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 4

2.0.0

Breaking
- Set minimum supported Python version to 3.9
- Remove pyre2 as it hasn't been updated in a long time and regex seems to be the better lib here
- Remove long deprecated methods "decode_email", "decode_email_b"

Changes
- Add ruff config
- Add Python 3.12 to tests

1.17.5

Changes
- Remove obsolete methods.
- Rework hashing wrapper methods.

Added
- Add a custom e-mail parsing policy for fixhing invalid values as soon as possible.
- Currently implemented for invalid message-id and date parsing.

1.17.4

Changes
- Renamed eml_parser.eml_parser to eml_parser.parser to make imports safer. This should not break any usage but nonetheless
make sure to verify that you are not importing eml_parser.eml_parser.
- While adding tests for Python 3.11, cchardet fails to install. Turns out it seems to be abandoned and as such it has been
replaced with [charset-normalizer](https://github.com/Ousret/charset_normalizer).
- Migrate setup.cfg to pyproject.toml

Fixes
- Fix typing and linter issues.

1.17.3

Fixes
- Fix parsing bad message-id formats 79.

1.17.2

Fixes
- When serialising RFC822 payloads, use a custom policy which has no limits on line-lenthgs as this breaks badly encoded messages.

1.17.1

Fixes
- Fix issue 76 "If a CR or LF is found in a malformed email address header fields (From/To/etc.), the ValueError breaks the parsing." (malvidin, cccs-rs)

Page 1 of 4

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.