Octodns-route53

Latest version: v0.0.7

Safety actively analyzes 682229 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 2

0.0.7

Important

* Add `append_to_names` tag append parameter to sources
* Add `DS` record type support
* Updated role authentication to use the correct session token value

0.0.6

Important

* Adds Provider.list_zones to enable new dynamic zone config functionality
* Ec2Source added to support dynamically creating records for Ec2 instances
* ElbSource added to support dynamically creating records for ELBs
* role_name added to auth mix-in to support acquiring a specific role from existing credentials
* Warn and skip records with TrafficPolicyInstanceId as they're not supported

Misc

* Fixed issue with creating TCP healthchecks for dynamic CNAME records

0.0.5

Important

* Add support for Route53Provider/ALIAS provider-specific type, see README for
more information. octoDNS will now see and try to manage existing Route53
ALIAS records. See https://github.com/octodns/octodns-route53/issues/34#issuecomment-1228568776
for more details on what this means and how to add them to your configs or
ignore them.

Misc

* Enable SUPPORTS_ROOT_NS for management of root NS records. Requires
octodns>=0.9.16.
* Health checks ref's use a hash when ref > 64 chars, to support long fqdns.
* Add support for FailureThreashold in healthchecks
* Make sure health checks get deleted from CNAME records

0.0.4

* install_requires includes pycountry-convert as it's a runtime requirement
* other misc script/tooling improvements

0.0.3

* Fix boto -> boto3 type-o/problem with setup.py
* Switch to pytest since nose is long :skull:ed

0.0.2

* setup.py now uses find_packages so that processors are now found/included

Page 1 of 2

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.