diff options
author | bwarsaw <> | 2004-02-10 22:35:44 +0000 |
---|---|---|
committer | bwarsaw <> | 2004-02-10 22:35:44 +0000 |
commit | d8f0638ced1b086e27750424f7279076baa0861d (patch) | |
tree | c772fa22daceeeab33091fd9ae1bfca59668726d /NEWS | |
parent | b6bb505dbf3b350e6a71739627dd9fb82a293549 (diff) | |
download | mailman2-d8f0638ced1b086e27750424f7279076baa0861d.tar.gz mailman2-d8f0638ced1b086e27750424f7279076baa0861d.tar.xz mailman2-d8f0638ced1b086e27750424f7279076baa0861d.zip |
Describe the changes in the qrunner system, bin/dumpdb, the bounce processor
and the pending database.
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 23 |
1 files changed, 22 insertions, 1 deletions
@@ -1,9 +1,30 @@ Mailman - The GNU Mailing List Management System -Copyright (C) 1998-2003 by the Free Software Foundation, Inc. +Copyright (C) 1998-2004 by the Free Software Foundation, Inc. 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA Here is a history of user visible changes to Mailman. +2.1.5 (XX-XXX-2004) + + - The qrunner system has changed to use only one file per message. + However the configuration variable METADATA_FORMAT has been removed, and + support for SAVE_MSGS_AS_PICKLES has been changed. The latter no longer + writes messages as plain text. Instead, they are stored as pickles of + plain strings, using the text pickle format. This still makes them + non-binary files readable and editable by humans. + + bin/dumpdb also works differently. It will print out the entire pickle + file (with more verbosity) and if used with 'python -i', it binds msg to + a list of all objects found in the pickle file. + + - The bounce processor has been redesigned so that now when an address's + bounce score reaches the threshold, that address will be sent a probe + message. Only if the probe bounces will the address be disabled. The + score is reset to zero when the probe is sent. + + - The pending database has been changed from a global pickle file, to a + unique pickle file per mailing list. + 2.1.4 (31-Dec-2003) - Close some cross-site scripting vulnerabilities in the admin pages |