From 697089b43dbab965fcc03a2b8ea44b2b22abc873 Mon Sep 17 00:00:00 2001 From: Timothy Miller Date: Mon, 23 Mar 2026 19:42:05 -0400 Subject: [PATCH] Bump to 2.0.9 --- Cargo.lock | 2 +- Cargo.toml | 2 +- SECURITY.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/Cargo.lock b/Cargo.lock index 6b56d88..f5b1831 100644 --- a/Cargo.lock +++ b/Cargo.lock @@ -139,7 +139,7 @@ dependencies = [ [[package]] name = "cloudflare-ddns" -version = "2.0.8" +version = "2.0.9" dependencies = [ "chrono", "idna", diff --git a/Cargo.toml b/Cargo.toml index d206931..89a8065 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -1,6 +1,6 @@ [package] name = "cloudflare-ddns" -version = "2.0.8" +version = "2.0.9" edition = "2021" description = "Access your home network remotely via a custom domain name without a static IP" license = "GPL-3.0" diff --git a/SECURITY.md b/SECURITY.md index a52f9e5..8b71857 100644 --- a/SECURITY.md +++ b/SECURITY.md @@ -47,7 +47,7 @@ This project handles **Cloudflare API tokens** that grant DNS editing privileges - The Docker image runs as a **static binary from scratch** with zero runtime dependencies, which minimizes the attack surface. - Use `security_opt: no-new-privileges:true` in Docker Compose deployments. -- Pin image tags to a specific version (e.g., `timothyjmiller/cloudflare-ddns:v2.0.8`) rather than using `latest` in production. +- Pin image tags to a specific version (e.g., `timothyjmiller/cloudflare-ddns:v2.0.9`) rather than using `latest` in production. ### Network Security