File: changes.md

package info (click to toggle)
a2d 2.0.5-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 1,088 kB
  • sloc: javascript: 4,806; python: 1,873; xml: 49; sh: 44; makefile: 17
file content (105 lines) | stat: -rw-r--r-- 3,626 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
All notable changes to a2d will be documented in this file.

### [Version 2.0.5] - 2024-07-21

#### Change
- Created new documentation using MkDocs.
- Linked the App Info section to the new documentation.

### [Version 2.0.4] - 2024-07-17

#### Change
- Included tests for a2d.
- Updated dependencies in pyproject.toml.
- Set default port number in a2d.desktop to 9333.

#### Removal
- Removed nginx and certbot as hard dependencies.

### [Version 2.0.3] - 2023-10-27

#### Change
- Transition to a consolidated single Python package approach.

### [Version 2.0.1] - 2023-10-09

#### Feature
- Message counts added to APRS to DAPNET Transmit logs.

#### Change
- Optimized multicore processing for dual-core processors, like the Raspberry Pi
Zero 2 W.

#### Security fix
- Implemented yaml safe_load instead of pickle for a2d configuration backup.

### [Version 2.0.0] - 2023-09-01

#### Feature
- Introduced a user-friendly Flask web app to enhance the a2d experience.
- The UI now displays a2d status and message logs.
- Implemented both light and dark modes for a visually appealing user interface.
- Enhanced security with PIN access protected by a Passphrase for the UI.
- Users can now back up and restore a2d configurations conveniently.
- Added an Instructions section to guide users within the UI.
- Implemented an automatic logout feature after 30 min of inactivity.
- Introduced automated APRS fetch interval management to prevent APRS account
lock.
- Users can now access listen port, server name, and manage SSL certificates
(self-signed and CA).
- Introduced an option to select a2d default settings.
- Implemented a factory reset feature for a2d, users can retain SSL
certificates.
- Enhanced server status UI with all status including SSL and certificate in
use.
- Added network health monitoring to track round trip time (RTT) to APRS and
DAPNET servers.
- Included clear notifications and feedback messages in the UI based on user
interactions.

#### Change
- Accelerated data processing by utilizing multiprocessing for efficient
multicore utilization.
- Consolidated multiple system services into a single, resource-efficient system
service.
- Streamlined installation by transitioning from the pip repository to the apt
repository for dependencies.
- Improved session management with the introduction of the auto logout feature.
- Enhanced database read/write operations and implemented self-healing
mechanisms if data corruption occurs.

#### Deprecation
- Deprecated the use of terminal and SSH commands for setting up and running
a2d.

#### Removal
- Eliminated terminal access to user data, replacing it with the new web app
interface.
- Removed a2d_core services, adopting a more efficient cron job-based approach
to improved efficiency and resource usage.

#### Bug fix
- Addressed an issue where the database was being unnecessarily written during
each run.
- Resolved database corruption in specific scenarios.
- Prevented message loss due to frequent APRS fetch by introducing automated
APRS fetch interval management.

#### Security fix
- Implemented safeguards to prevent flooding bulk messages to DAPNET during the
initial run.
- Optimized data transfer from ARPS for improved efficiency.
- Strengthened data transfer to DAPNET with enhanced error handlingfor incorrect
credentials.

### [Version 1.0.0] - 2023-06-23

#### Feature
- Added a user-friendly input method for gathering user information and
configuring a2d.

#### Change
- Enhanced security by implementing encryption for user information.

#### Bug fix
- Resolved the issue where callsign 0 was incorrectly representing the SSID.