2015-04-19 03:22:17 -05:00
< html >
< head >
< meta http-equiv = "Content-Type" content = "text/html; charset=utf-8" / >
2015-04-19 03:52:26 -05:00
< title > iRedAPD (Postfix Access Policy Daemon) release notes and upgrade tutorials< / title >
2015-04-19 03:22:17 -05:00
< link href = "./css/markdown.css" rel = "stylesheet" > < / head >
< / head >
< body >
< div id = "navigation" >
< a href = "http://www.iredmail.org" target = "_blank" > iRedMail web site< / a >
// < a href = "./index.html" > Document Index< / a >
2015-04-19 03:52:26 -05:00
< / div > < h1 id = "iredapd-postfix-access-policy-daemon-release-notes-and-upgrade-tutorials" > iRedAPD (Postfix Access Policy Daemon) release notes and upgrade tutorials< / h1 >
2015-04-19 03:22:17 -05:00
< blockquote >
< p > iRedAPD source code is hosted on < a href = "https://bitbucket.org/zhb/iredapd/" > BitBucket< / a > .< / p >
< p > Download the < a href = "https://bitbucket.org/zhb/iredapd/downloads" > latest iRedAPD stable release< / a > .< / p >
2015-04-19 03:45:21 -05:00
< p > If you want to develop your own plugin for iRedAPD, please read document
< a href = "https://bitbucket.org/zhb/iredapd/src/default/README_PLUGINS.md?at=default" > README_PLUGINS.md< / a > in iRedAPD source code.< / p >
2015-04-19 03:22:17 -05:00
< / blockquote >
< h2 id = "upgrade-iredapd" > Upgrade iRedAPD< / h2 >
< p > < a href = "./upgrade.iredapd.html" > How to upgrade iRedAPD-1.4.0 or later versions to the latest stable release< / a > < / p >
2015-05-16 21:01:52 -05:00
< h2 id = "changelog" > ChangeLog< / h2 >
2015-05-26 04:43:55 -05:00
< h3 id = "160" > 1.6.0< / h3 >
< ul >
< li > New setting: < code > MYNETWORKS< / code > . used to set trusted or internal networks.< / li >
< li > Plugin < code > ldap_domain_wblist< / code > was removed, we didn't use it at all.< / li >
2015-06-03 09:30:41 -05:00
< li >
< p > Fixed issues:< / p >
< ul >
< li > plugin/ldap_maillist_access_policy.py: not use correct ldap
connection cursor. this causes access policy not work.< / li >
< li > plugin/reject_sender_login_mismatch.py: Not return correct value for
allowed senders.< / li >
< li > Not correctly fetch SQL query result with SQLAlchemy.< / li >
< li > Doesn't work with PostgreSQL backend.< / li >
< li > iRedAPD daemon exits with error (9, 'Bad file descriptor').< / li >
2015-05-26 04:43:55 -05:00
< / ul >
< / li >
< / ul >
2015-05-16 21:01:52 -05:00
< h3 id = "150" > 1.5.0< / h3 >
< ul >
< li >
< p > Improvements:< / p >
< ul >
< li > Use sql connection pool provided by SQLAlchemy for better performance.< / li >
< li > Log reject and other non-DUNNO actions in iredadmin database (< code > log_action_in_db = True< / code > ).< / li >
< li > Plugin < code > amavisd_wblist< / code > : able to use < code > user@*< / code > as white/blacklist sender.< / li >
< li > Plugin < code > sql_alias_access_policy< / code > and < code > ldap_maillist_access_policy< / code > :
able to use < code > *@domain.com< / code > (all senders from < code > domain.com< / code > ) as
moderator.< / li >
< li >
< p > Plugin < code > reject_sender_login_mismatch< / code > :< / p >
< ul >
< li > New optional setting < code > ALLOWED_LOGIN_MISMATCH_LIST_MEMBER< / code > , used to
allow member of mail list/alias to send as mail list/alias.
Default is False.< / li >
< li > Setting < code > ALLOWED_LOGIN_MISMATCH_SENDERS< / code > is now optional.< / li >
< / ul >
< / li >
< li >
< p > Log smtp protocol state in log file (< code > RCPT< / code > , < code > END-OF-MESSAGE< / code > ).< / p >
< / li >
< / ul >
< / li >
< li >
< p > Fixed issues:< / p >
< ul >
< li > Plugin < code > amavisd_message_size_limit< / code > : just use the first valid
policy (with highest priority) and skip rest.< / li >
< li > Plugin < code > reject_sender_login_mismatch< / code > : not reject email if sender
is forged address (sender domain is hosted locally).< / li >
< li > Not close sql connection explicitly.< / li >
< / ul >
< / li >
< / ul >
2015-04-19 03:22:17 -05:00
< h3 id = "145" > 1.4.5< / h3 >
< ul >
< li >
< p > Improvements:< / p >
< ul >
< li > Log non-DUNNO actions in iredadmin database (with setting
< code > log_action_in_db = True< / code > in iRedAPD config file).< / li >
< li > plugin/amavisd_wblist.py: able to use < code > user@*< / code > as white/blacklist sender.< / li >
< li > plugin/sql_alias_access_policy.py, plugin/ldap_maillist_access_policy:
able to use < code > *@domain.com< / code > (all senders from < code > domain.com< / code > ) as moderator.< / li >
< li >
< p > plugin/reject_sender_login_mismatch.py:< / p >
< ul >
< li >
< p > New optional setting < code > ALLOWED_LOGIN_MISMATCH_LIST_MEMBER< / code > , used to
allow member of mail list/alias to send as mail list/alias.
Default is False.< / p >
< / li >
< li >
< p > Setting < code > ALLOWED_LOGIN_MISMATCH_SENDERS< / code > is now optional.< / p >
< / li >
< / ul >
< / li >
< li >
< p > Log smtp protocol state in log file.< / p >
< / li >
< / ul >
< / li >
< li >
< p > Fixed issues:< / p >
< ul >
< li > plugin/amavisd_message_size_limit.py: just use the first valid
policy (with highest priority) and skip rest.< / li >
< li > plugin/reject_sender_login_mismatch.py: not reject email if sender
is forged address (sender domain is hosted locally).< / li >
< li > Not close sql connection explicitly.< / li >
< / ul >
< / li >
< / ul > < p style = "text-align: center; color: grey;" > Document published under a < a href = "http://creativecommons.org/licenses/by-nd/3.0/us/" target = "_blank" > CC BY-ND 3.0< / a > license. If you found something wrong, please do < a href = "http://www.iredmail.org/contact.html" > contact us< / a > to fix it.< script >
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','//www.google-analytics.com/analytics.js','ga');
ga('create', 'UA-3293801-21', 'auto');
ga('send', 'pageview');
< / script >
< / body > < / html >