2 # the list of regexes for messages that we won't store having
3 # received them (bear in mind that we must receive them fully before
7 # The format of each line is as follows
9 # type source pattern tofield to
10 # P/B/F T/F/O/S regex T/F/O/S expression
12 # type: P - private, B - bulletin (msg), F - file (ak1a bull)
13 # source: T - to field, F - from field, O - origin, S - subject
14 # pattern: a perl regex on the field requested
15 # tofield: T - to field, F - from field, O - origin, S - subject
16 # to: what you want this field changed to
18 # Currently only type B and P msgs are affected by this code.
20 # The list is read from the top down, the first pattern that matches
21 # causes the action to be taken.
23 # Basically this will take all the headers in turn and shove them thru the
24 # rewrite engine, starting at the top.
26 # The result is then passed thru the rest of the system as though it came in
29 # You can either swop a field for another another value or set a field to
30 # value after regexing another field - useful in europe where we are paranoid
31 # about for sale notices - you can check subject for suspicious words and
32 # the swop the TO field.