Octodns

Latest version: v1.10.0

Safety actively analyzes 675368 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 9 of 10

0.8.4

Lots of updates based on our internal use, needs, and feedback & suggestions
from our OSS users. There's too much to list out since the previous release was
cut, but I'll try to cover the highlights/important bits and promise to do
better in the future :fingers_crossed:

Major:

* Complete rework of record validation with lenient mode support added to
octodns-dump so that data with validation problems can be dumped to config
files as a starting point. octoDNS now also ignores validation errors when
pulling the current state from a provider before planning changes. In both
cases this is best effort.
* Naming of record keys are based on RFC-1035 and friends, previous names have
been kept for backwards compatibility until the 1.0 release.
* Provider record type support is now explicit, i.e. opt-in, rather than
opt-out. This prevents bugs/oversights in record handling where providers
don't support (new) record types and didn't correctly ignore them.
* ALIAS support for DNSimple, Dyn, NS1, PowerDNS
* Ignored record support added, `octodns:\n ignored: True`
* Ns1Provider added

Miscellaneous

* Use a 3rd party lib for natural sorting of keys, rather than my old
implementation. Sorting can be disabled in the YamlProvider with
`enforce_order: False`.
* Semi-colon/escaping fixes and improvements.
* Meta record support, `TXT octodns-meta.<zone>`. For now just
`provider=<provider-id>`. Optionally turned on with `include_meta` manager
config val.
* Validations check for CNAMEs co-existing with other records and error out if
found. Was a common mistaken/unknown issue and this surfaces the problem
early.
* Sizeable refactor in the way Route53 record translation works to make it
cleaner/less hacky
* Lots of docs type-o fixes
* Fixed some pretty major bugs in DnsimpleProvider
* Relax UnsafePlan checks a bit, more to come here
* Set User-Agent header on Dyn health checks

0.8.0

0.0.10

* Don't attempt to change 'always_serve' flag when Traffic manager's endpoint
is disabled.

0.0.9

* Add support for fully managing/configuring the client retry policy & fix
previous config options so that they actually take effect

0.0.8

* Support for authenticating via the CLI/AzureCliCredential
* Validate that healthcheck protocol is supported (HTTP, HTTPS, TCP)
* Upgrade `azure-identity>= 1.6.1` to fix security vulnerabilities

0.0.7

* Create DS records after their sibling NS records to appease Cloudflare's
validations
* Throw an error when trying to create a DS without a coresponding NS,
`strict_supports: false` will omit the DS instead

Page 9 of 10

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.