--
You received this message because you are subscribed to the Google Groups "Microsoft Money" group.
To unsubscribe from this group and stop receiving emails from it, send an email to microsoft-mon...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/microsoft-money/6086b151-6156-4596-b09a-1f4668c5de83n%40googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/microsoft-money/3b336d5a-8dd0-427a-9aed-da32bdd86116n%40googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/microsoft-money/97943137-6658-45eb-af7b-ace6c681cfebn%40googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/microsoft-money/72c3300f-eb0a-45a7-83f6-ed304db5d4a9n%40googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/microsoft-money/dabd551c-891d-480d-b3a0-2084149c01e0n%40googlegroups.com.
I wrote code to address the problem discussed on this page.
Seems to be working, but you decide. It is often better to make a copy of your *.mny file, and open the copy to test. Don't forget to switch back to your main *.mny after testing.
The reason for the odd naming is that I modified my PocketSense scrubber, and expect to later release an update. The included files in scrub_cl6_vanguard.zip:
- scrub_cl6_vanguard.py #the Python file... not pretty, but questions on this thread are encourage.
- vangofx.bat #Use this; modify to match your situation. Finds latest Vanguard qfx in the normal downloads folder, and passes that to the Python program
- vang.txt #a file with a few notes
- vang_test_file.qfx #test file I used in working on scrub_cl6_vanguard.py -- ignore normally.
https://drive.google.com/file/d/1-eWz6Bxy512CsHg2Xsjbi5Cvd08GSMu_/view?usp=sharing link should give you public access to copy scrub_cl6_vanguard.zip.
Lightly tested. Mistakes are more than possible. Identify what works or not. I am not planning to make this fancy.
Cal Learner.
SHA1 Size Name
---------------------------------------- ------------- ------------
e6b5e6b365c6001a66bb3950c8fc6c0463d16a15 10589 scrub_cl6_vanguard.zip
I have an OFX file downloaded from Vanguard that has a little of everything: stocks, bonds, mutual funds, and EFTs. The EFTs have the issue documented in this thread. The OFXAnalyzer gave these issues:
Attached is a zip file documenting the issues, has an example problem file, and contains a set of python 3.11 files that scrub the problem file.
Caution: Not PocketSense, narrowly tested and run only by me. Use at your own risk.