dependabot[bot] [Fri, 4 Nov 2022 16:08:34 +0000 (16:08 +0000)]
Update wheel requirement from ^0.37.1 to ^0.38.1
Updates the requirements on [wheel](https://github.com/pypa/wheel) to permit the latest version.
- [Release notes](https://github.com/pypa/wheel/releases)
- [Changelog](https://github.com/pypa/wheel/blob/main/docs/news.rst)
- [Commits](https://github.com/pypa/wheel/compare/0.37.1...0.38.1)
Bob Halley [Fri, 14 Oct 2022 01:10:34 +0000 (18:10 -0700)]
For async send_udp(), return a length and clarify the expiration
is meaningless.
For async receive_udp(), document that the return type is always a
3-tuple, as opposed to being either a pair or a 3-tuple as in the
sync version. (I chose to document rather than change the behavior
as changing it broke dnspython tests and might possibly break other
code.) [#848]
dependabot[bot] [Fri, 7 Oct 2022 16:04:54 +0000 (16:04 +0000)]
Update requests-toolbelt requirement from ^0.9.1 to >=0.9.1,<0.11.0
Updates the requirements on [requests-toolbelt](https://github.com/requests/toolbelt) to permit the latest version.
- [Release notes](https://github.com/requests/toolbelt/releases)
- [Changelog](https://github.com/requests/toolbelt/blob/master/HISTORY.rst)
- [Commits](https://github.com/requests/toolbelt/compare/0.9.1...0.10.0)
Update pytest-cov requirement from ^3.0.0 to ^4.0.0
Updates the requirements on [pytest-cov](https://github.com/pytest-dev/pytest-cov) to permit the latest version.
- [Release notes](https://github.com/pytest-dev/pytest-cov/releases)
- [Changelog](https://github.com/pytest-dev/pytest-cov/blob/master/CHANGELOG.rst)
- [Commits](https://github.com/pytest-dev/pytest-cov/compare/v3.0.0...v4.0.0)
Update trio requirement from >=0.14,<0.22 to >=0.14,<0.23
Updates the requirements on [trio](https://github.com/python-trio/trio) to permit the latest version.
- [Release notes](https://github.com/python-trio/trio/releases)
- [Commits](https://github.com/python-trio/trio/compare/v0.14.0...v0.22.0)
Update cryptography requirement from >=2.6,<38.0 to >=2.6,<39.0
Updates the requirements on [cryptography](https://github.com/pyca/cryptography) to permit the latest version.
- [Release notes](https://github.com/pyca/cryptography/releases)
- [Changelog](https://github.com/pyca/cryptography/blob/main/CHANGELOG.rst)
- [Commits](https://github.com/pyca/cryptography/compare/2.6...38.0.1)
Updates the requirements on [wheel](https://github.com/pypa/wheel) to permit the latest version.
- [Release notes](https://github.com/pypa/wheel/releases)
- [Changelog](https://github.com/pypa/wheel/blob/main/docs/news.rst)
- [Commits](https://github.com/pypa/wheel/compare/0.35.0...0.37.1)
corubba [Fri, 5 Aug 2022 12:09:52 +0000 (14:09 +0200)]
Add support for more bases in $GENERATE
When reading a zone from a zonefile, the `$GENERATE` resolution now not
only supports decimal but also octal, hexadecimal and nibbles.
When using nibbles with an even width, the generated index may end with
a dot, and alone is interpreted as a absolute name. This behaviour is
consistent with bind, but may cause these records to be dropped by the
subdomain-check in `zonefile.py:398` (see also the `h.*` labels in the
testcase that are missing from the result).
dependabot[bot] [Tue, 2 Aug 2022 16:02:37 +0000 (16:02 +0000)]
Update flake8 requirement from ^4.0.1 to ^5.0.3
Updates the requirements on [flake8](https://github.com/pycqa/flake8) to permit the latest version.
- [Release notes](https://github.com/pycqa/flake8/releases)
- [Commits](https://github.com/pycqa/flake8/compare/4.0.1...5.0.3)
Brian Wellington [Fri, 15 Jul 2022 16:01:17 +0000 (09:01 -0700)]
Fix dns.rdatatype special cases.
Prior to this change, there was logic in dns.rdatatype.from_text() and
to_text() to deal with types not handled by the RdataType enum;
specifically, the NSAP-PTR type (the enum value has a different name,
because of the hyphen) and user-registered types.
This was fine when internal code called these methods, but most callers
of from_text() were converted to dns.rdatatype.RdataType.make(), which
supports both integer and text input, and it doesn't handle the special
cases.
This change adds more hooks into the enum wrapper and moves the special
case handling for RdataType into them.
dependabot[bot] [Wed, 8 Jun 2022 16:03:17 +0000 (16:03 +0000)]
Update trio requirement from >=0.14,<0.21 to >=0.14,<0.22
Updates the requirements on [trio](https://github.com/python-trio/trio) to permit the latest version.
- [Release notes](https://github.com/python-trio/trio/releases)
- [Commits](https://github.com/python-trio/trio/compare/v0.14.0...v0.21.0)
Benjamin Drung [Mon, 16 May 2022 10:59:58 +0000 (12:59 +0200)]
Allow skipping test cases that need Internet access
Support skipping all test cases that access the Internet by setting the
environment variable `NO_INTERNET`. This is useful to make the test run
reproducible and robust for future runs (to avoid breaking in case some
random service on the Internet changes).
Update cryptography requirement from >=2.6,<37.0 to >=2.6,<38.0
Updates the requirements on [cryptography](https://github.com/pyca/cryptography) to permit the latest version.
- [Release notes](https://github.com/pyca/cryptography/releases)
- [Changelog](https://github.com/pyca/cryptography/blob/main/CHANGELOG.rst)
- [Commits](https://github.com/pyca/cryptography/compare/2.6...37.0.0)
dependabot[bot] [Thu, 31 Mar 2022 16:02:55 +0000 (16:02 +0000)]
Update twine requirement from ^3.1.1 to ^4.0.0
Updates the requirements on [twine](https://github.com/pypa/twine) to permit the latest version.
- [Release notes](https://github.com/pypa/twine/releases)
- [Changelog](https://github.com/pypa/twine/blob/main/docs/changelog.rst)
- [Commits](https://github.com/pypa/twine/compare/3.1.1...4.0.0)
Brian Wellington [Fri, 25 Mar 2022 20:23:07 +0000 (13:23 -0700)]
Fix passing source address with httpx.
When dns.query.https() is passed a source address, it needs to create an
adapter for either requests or httpx to use it. As it doesn't know
which one will actually be used, it creates both. But then if it
decides to use httpx, it attempts to attach the requests adapter, which
fails.
Brian Wellington [Fri, 25 Mar 2022 20:21:16 +0000 (13:21 -0700)]
Fix httpx verify bug.
If both source and verify are passed to dns.query.https() when using
httpx, the verify parameter is ignored. This is because the code
creates a custom transport for the source address, and httpx only uses the
verify parameter when creating a transport.
The fix is to pass in the verify parameter when we create a transport.