Nsupdate

Latest version: v0.12.0

Safety actively analyzes 687918 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 3

0.13.0

---------------------------------

New Features:

- add BAD_HOSTS setting to lock out nasty clients from the update api
without causing database accesses.
- django-admin faults: show/reset api auth faults counter
- add api_auth_faults column to django admin's Hosts view

Fixes:

- fixed misc. crashes
- fixed Domain.generate_ns_secret() storing bytes object into Domain.nameserver_update_secret leading to trying to insert the string representation of the bytes object, so 91 characters in a varchar(88)

Other changes:

- drop support for python 3.4, fixes 406 - you need either 2.7 or 3.5+.
- require django >= 1.11.0, run travis-ci tests on django 2.2
- django compatibility improvements
- translation updates (removed incomplete ones, added complete ones)
- improve logging
- setuptools-scm managing the version and manifest
- src/ based project layout
- Add A Well-Known URL for Changing Passwords
- Add rel="noopener" to target="_blank" links

0.12.0

Not secure
---------------------------

New Features:

* Related Hosts: leave v4 or v6 interface ID empty to not create a DNS record
* added configuration help for:

- IPfire, 209
- EdgeOS, 86
- Speedport Hybrid, 286
- dyndnsc
* avoid domains vs. hosts confusion - check dns availability, 168
* add a simple domain name validator, 308
* admin: sort host and domains by name
* validate (domain of) email address in registration form, 284
* implement django-admin domains --stale-check


Fixes:

* exception "IPAddress() does not support netmasks or subnet prefixes", 223
* Traceback on DNS server Timeout, 211
* emails should mention fqdn, 225
* TemplateDoesNotExist exception, 222
* "faults" management command: use atomic transaction PER HOST, 208
* avoid that invalid domains get added, 205
* fix traceback when language in user profile is None, 206
* fix traceback when using a malformed nameserver secret, 213
* upgrade django-registration-redux, fixes pw reset, 250 251 252
* check_domain fixes: 246, 249, 253
* test updates when a domain is set to available, 168
* unicode error under python2.7, 242
* fix SameIpError in host add form processing, 267
* fix first param type of loader.select_template, 255
* api basic auth - ignore non-utf8 chars, 282
* fix crash on ShortHeader and other DNSException subclasses, 247
* more clear dns server configuration check error msg, 278
* update DD-WRT config instructions, 300
* update pfSense tab to get IP from Result Match
* avoid invalid IP address crash, 394
* new host creation: set update timestamps to current time, 357
* remove hardcoded db session engine, use SESSION_ENGINE
* Python 3.7 and Django 2.x related fixes/changes

- use new MIDDLEWARE setting (since Django 1.10) instead of MIDDLEWARE_CLASSES
- setup.py: don't require a specific Django version, so 1.1 and 2.x works
* add ugly workaround for crash in django-admin users --stale-check
* django-admin.py users: avoid unicode issues by using %r, 350
* django-admin.py users: initialize log_msg
* no exceptions when context processor saves the session, 356
* use a much simpler errorpage.html template, related to 356 365
* catch exceptions of dns.tsigkeyring.from_text(), 338, 319
* do not strip interface_id_ipv(4|6) if empty/None, 355
* use same cleaning for the secret in (Create|Edit)DomainForm, 338
* django-admin domains --check: catch UnknownTSIGKey, 336
* transform UnknownTSIGKey into DnsUpdateError, 337
* fix placeholders in domains management script
* work around UnknownTSIGKey exception blowing up the overview view


Other changes:

* dropped support for Python 3.3
* added support for Python 3.6 and 3.7
* update django requirement to ~=1.11.0 (LTS), 293
* update django links in admin docs to point to 1.11
* travis:

- drop: py33, add: py35, py36, py36-dev, py37
- test on trusty with sudo, against local bind9 dns
- test always using latest Django 1.11 minor version
* pip: remove --use-mirrors
* use TEMPLATES setting for Django 1.8+, remove outdated TEMPLATE_*
* use www.BASEDOMAIN for WWW_HOST, prepare for 224
* added "nsupdate.info" to publicsuffix.org,
this is needed to not run into rate limiting with letsencrypt.org.
* zone creation: add hint about public suffix list
* upgrade django-registration-redux, python-social-auth
* upgrade Font Awesome, Bootstrap, jQuery
* add subresource integrity, 23
* use other cdn for Bootstrap
* set SECRET_KEY in development configuration
* add some words about DNSSEC to the docs, 26
* do not use html registration emails
* optimize database query on overview page
* sort hosts and domains by name, 192
* update inadyn configuration to 2.1
* update OpenWrt config example for Chaos Calmer, 259
* update badges, new readthedocs.io url
* use error views without templating, 365
* shorter default session expiry, 381

0.11.0

Not secure
---------------------------

New Features:

* Hosts: show client authentication error/success on the host view
* Domains: support optional secondary nameserver - if given, prefer it for
DNS queries
* implement host IP blacklist, fixes 162
* implement host staleness level + management script to check whether host IP
is being updated
* add language to user profiles
* add registration_closed template

Fixes:

* catching more exceptions
* misc. UI fixes / improvements
* misc. python3 compatibility fixes / improvements
* fix resolving to not add the service server's domain, but just "."
* timeout / retry timings adjusted
* "Login" button at end of user registration does not work 183
* catch IndexError when computing IP of related hosts, fixes 190
* catch socket.error (e.g. "connection refused"), fixes 195

Other changes:

* made form field labels translatable, added translations, added plurals
* added tuning tips section to admin docs (not much yet)
* some internal cleanups / refactorings
* use templated error pages for 400,403,404,500 http status codes
* upgraded CDN links for bootstrap, jquery, font-awesome

0.10.0

Not secure
---------------------------

New Features:

* if the abuse / abuse_blocked flag is set for a host, it is removed from DNS
* users can delete their accounts, if they want to stop using the service
(all hosts, domains, etc. created by this user will be deleted)
* added admin UI for Related Hosts
* added "domains" management command to check the domains (reachability of
nameserver, does nameserver answer queries for the domain?)

Fixes:

* the link in the registration mail is now https if the site runs with https
* avoid sending unneccessary "delete" updates to master nameserver - first
check if there is something to delete

Other changes:

* support and require Django >= 1.7
* remove Python 2.6 support, require 2.7 or 3.3+
* remove support for "south" migrations (used for 0.9.x and before)
* add support for django 1.7's builtin migrations
* misc. layout / UI improvments
* misc. doc improvements
* improved original strings in translations, use "trimmed" in django templates
* upgraded bootstrap

0.9.1

Not secure
-------------

Fixes:

* fix security issue with "related hosts" / "service updaters", fixes 177

0.9.0

Not secure
-------------

Note: 0.9 is the last release with Django 1.6.x support, we'll remove support
for it in 0.10 (because Django 1.7 has some implications that make it hard to
support 1.6 and 1.7).

New Features:

* Related Hosts: support updating DNS records of other hosts in same LAN by
a single updater (e.g. for IPv6 with changing prefix, IPv4 also works)
* Handle IPv4-mapped IPv6 addresses
Some reverse proxy configurations pass REMOTE_ADDR as a IPv4-mapped IPv6
address when listening on a IPv6 socket.
We now convert such a mapped address into a IPv4 address at all usages.
Handles both the ::ffff:192.0.2.128 format as well as the deprecated
::192.0.2.128 format.
* add "inadyn" dyndns updater to configuration help

Fixes:

* catch Timeout exceptions

Other changes:

* updated / added some translations

Page 1 of 3

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.