mirror of
https://github.com/StackExchange/dnscontrol.git
synced 2024-05-11 05:55:12 +00:00
_PROVIDER flag phase 1: generate warnings
This commit is contained in:
@@ -30,6 +30,7 @@ The `ActiveDirectory_PS` provider reads an `ADServer` setting from `creds.json`
|
||||
```js
|
||||
{
|
||||
"activedir": {
|
||||
"_PROVIDER": "ACTIVEDIRECTORY_PS",
|
||||
"ADServer": "ny-dc01"
|
||||
}
|
||||
}
|
||||
@@ -41,6 +42,7 @@ If you want to modify the "fake powershell" mode details, you can set them in th
|
||||
```js
|
||||
{
|
||||
"activedir": {
|
||||
"_PROVIDER": "ACTIVEDIRECTORY_PS",
|
||||
"ADServer": "ny-dc01",
|
||||
"fakeps": "true",
|
||||
"pslog": "powershell.log",
|
||||
@@ -49,6 +51,7 @@ If you want to modify the "fake powershell" mode details, you can set them in th
|
||||
}
|
||||
```
|
||||
|
||||
{% include providerfield.html %}
|
||||
|
||||
An example DNS configuration:
|
||||
|
||||
|
@@ -28,6 +28,7 @@ In the credentials file (creds.json), you must provide the following:
|
||||
|
||||
```json
|
||||
"akamaiedgedns": {
|
||||
"_PROVIDER": "AKAMAIEDGEDNS",
|
||||
"client_secret": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx",
|
||||
"host": "akaa-xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.xxxx.akamaiapis.net",
|
||||
"access_token": "akaa-xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx",
|
||||
|
@@ -14,6 +14,7 @@ In your credentials file, you must provide [username, password and a context](ht
|
||||
{% highlight json %}
|
||||
{
|
||||
"autodns": {
|
||||
"_PROVIDER": "AUTODNS",
|
||||
"username": "autodns.service-account@example.com",
|
||||
"password": "[***]",
|
||||
"context": "33004"
|
||||
|
@@ -42,6 +42,7 @@ For instance, your `creds.json` might looks like:
|
||||
```json
|
||||
{
|
||||
"axfrddns": {
|
||||
"_PROVIDER": "AXFRDDNS",
|
||||
"transfer-key": "hmac-sha256:transfer-key-id:Base64EncodedSecret=",
|
||||
"update-key": "hmac-sha256:update-key-id:AnotherSecret="
|
||||
}
|
||||
|
@@ -11,6 +11,7 @@ You can specify the API credentials in the credentials json file:
|
||||
```json
|
||||
{
|
||||
"azuredns_main":{
|
||||
"_PROVIDER": "AZURE_DNS",
|
||||
"SubscriptionID": "AZURE_SUBSCRIPTION_ID",
|
||||
"ResourceGroup": "AZURE_RESOURCE_GROUP",
|
||||
"TenantID": "AZURE_TENANT_ID",
|
||||
@@ -33,6 +34,7 @@ export AZURE_CLIENT_SECRET=BBBBBBBBB
|
||||
```json
|
||||
{
|
||||
"azuredns_main":{
|
||||
"_PROVIDER": "AZURE_DNS",
|
||||
"SubscriptionID": "$AZURE_SUBSCRIPTION_ID",
|
||||
"ResourceGroup": "$AZURE_RESOURCE_GROUP",
|
||||
"TenantID": "$AZURE_TENANT_ID",
|
||||
|
@@ -18,6 +18,7 @@ you can specify a `directory` where the provider will look for and create zone f
|
||||
```json
|
||||
{
|
||||
"bind": {
|
||||
"_PROVIDER": "BIND",
|
||||
"directory": "myzones",
|
||||
"filenameformat": "%U.zone" << The default
|
||||
}
|
||||
|
@@ -25,6 +25,7 @@ This method is enabled by setting the "apitoken" value in `creds.json`:
|
||||
```json
|
||||
{
|
||||
"cloudflare": {
|
||||
"_PROVIDER": "CLOUDFLAREAPI",
|
||||
"apitoken": "your-cloudflare-api-token",
|
||||
"accountid": "your-cloudflare-account-id"
|
||||
}
|
||||
|
@@ -14,6 +14,7 @@ Current version of provider doesn't support `sub-auth-user`.
|
||||
```json
|
||||
{
|
||||
"cloudns": {
|
||||
"_PROVIDER": "CLOUDNS",
|
||||
"auth-id": "12345",
|
||||
"sub-auth-id": "12345",
|
||||
"auth-password": "your-password"
|
||||
|
@@ -14,6 +14,7 @@ In your `creds.json` file, you must provide your API key and user/client token.
|
||||
```json
|
||||
{
|
||||
"cscglobal": {
|
||||
"_PROVIDER": "CSCGLOBAL",
|
||||
"api-key": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx",
|
||||
"user-token": "yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyyyyyyy",
|
||||
"notification_emails": "test@exmaple.tld,hostmaster@example.tld"
|
||||
|
@@ -11,6 +11,7 @@ In your providers credentials file you must provide a deSEC account auth token:
|
||||
```json
|
||||
{
|
||||
"desec": {
|
||||
"_PROVIDER": "DESEC",
|
||||
"auth-token": "your-deSEC-auth-token"
|
||||
}
|
||||
}
|
||||
|
Reference in New Issue
Block a user