1
0
mirror of https://github.com/StackExchange/dnscontrol.git synced 2024-05-11 05:55:12 +00:00

DOCS: Fixed creds.json example (#2385)

This commit is contained in:
Jeffrey Cafferata
2023-05-21 19:30:30 +02:00
committed by GitHub
parent 5ae231030e
commit 4d360d4bda
12 changed files with 60 additions and 55 deletions

View File

@@ -17,7 +17,7 @@ Notifications are set up in your credentials JSON file. They will use the `notif
"gcloud": {
...
} ,
"notifications":{
"notifications": {
"slack_url": "https://hooks.slack.com/services/T00000000/B00000000/XXXXXXXXXXXXXXXXXXXXXXXX",
"teams_url": "https://outlook.office.com/webhook/00000000-0000-0000-0000-000000000000@00000000-0000-0000-0000-000000000000/IncomingWebhook/00000000000000000000000000000000/00000000-0000-0000-0000-000000000000"
}

View File

@@ -21,7 +21,8 @@ Example:
{% code title="creds.json" %}
```json
"akamaiedgedns": {
{
"akamaiedgedns": {
"TYPE": "AKAMAIEDGEDNS",
"client_secret": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx",
"host": "akaa-xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.xxxx.akamaiapis.net",
@@ -29,6 +30,7 @@ Example:
"client_token": "akaa-xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx",
"contract_id": "X-XXXX",
"group_id": "NNNNNN"
}
}
```
{% endcode %}

View File

@@ -12,9 +12,9 @@ Example:
"TYPE": "AZURE_DNS",
"SubscriptionID": "AZURE_SUBSCRIPTION_ID",
"ResourceGroup": "AZURE_RESOURCE_GROUP",
"TenantID": "AZURE_TENANT_ID"
"TenantID": "AZURE_TENANT_ID",
"ClientID": "AZURE_CLIENT_ID",
"ClientSecret": "AZURE_CLIENT_SECRET",
"ClientSecret": "AZURE_CLIENT_SECRET"
}
}
```
@@ -38,8 +38,8 @@ export AZURE_CLIENT_SECRET=BBBBBBBBB
"SubscriptionID": "$AZURE_SUBSCRIPTION_ID",
"ResourceGroup": "$AZURE_RESOURCE_GROUP",
"ClientID": "$AZURE_CLIENT_ID",
"TenantID": "$AZURE_TENANT_ID"
"ClientSecret": "$AZURE_CLIENT_SECRET",
"TenantID": "$AZURE_TENANT_ID",
"ClientSecret": "$AZURE_CLIENT_SECRET"
}
}
```

View File

@@ -9,7 +9,7 @@ Example:
```json
{
"dnsmadeeasy": {
"TYPE_key": "DNSMADEEASY",
"TYPE": "DNSMADEEASY",
"api_key": "1c1a3c91-4770-4ce7-96f4-54c0eb0e457a",
"secret_key": "e2268cde-2ccd-4668-a518-8aa8757a65a0"
}

View File

@@ -15,8 +15,8 @@ and password used to log in to the [web interface](https://dns.he.net).
{
"hedns": {
"TYPE": "HEDNS",
"password": "yourPassword",
"username": "yourUsername"
"username": "yourUsername",
"password": "yourPassword"
}
}
```
@@ -32,9 +32,9 @@ This can also be done via an environment variable:
{
"hedns": {
"TYPE": "HEDNS",
"username": "yourUsername",
"password": "yourPassword",
"totp": "$HEDNS_TOTP",
"username": "yourUsername"
"totp": "$HEDNS_TOTP"
}
}
```
@@ -58,7 +58,8 @@ only available when first enabling two-factor authentication.
{% code title="creds.json" %}
```json
{
"hedns":{
"hedns": {
"TYPE": "HEDNS",
"username": "yourUsername",
"password": "yourPassword",
"totp-key": "yourTOTPSharedSecret"
@@ -87,10 +88,11 @@ This option is disabled by default when this key is not present,
{% code title="creds.json" %}
```json
{
"hedns":{
"hedns": {
"TYPE": "HEDNS",
"username": "yourUsername",
"password": "yourPassword",
"totp-key": "yourTOTPSharedSecret"
"totp-key": "yourTOTPSharedSecret",
"session-file-path": "."
}
}

View File

@@ -39,7 +39,7 @@ Here a working example for our OT&E System:
"apilogin": "test.user",
"apipassword": "test.passw0rd",
"apientity": "OTE",
"debugmode": "0",
"debugmode": "0"
}
}
```

View File

@@ -38,9 +38,9 @@ This can also be done via an environment variable:
{
"inwx": {
"TYPE": "INWX",
"username": "yourUsername",
"password": "yourPassword",
"totp": "$INWX_TOTP",
"username": "yourUsername"
"totp": "$INWX_TOTP"
}
}
```
@@ -64,9 +64,9 @@ This secret is only shown once when two factor authentication is enabled and you
{
"inwx": {
"TYPE": "INWX",
"username": "yourUsername",
"password": "yourPassword",
"totp-key": "yourTOTPSharedSecret",
"username": "yourUsername"
"totp-key": "yourTOTPSharedSecret"
}
}
```
@@ -79,7 +79,8 @@ redirect all requests to the sandbox API instead:
{% code title="creds.json" %}
```json
{
"inwx":{
"inwx": {
"TYPE": "INWX",
"username": "yourUsername",
"password": "yourPassword",
"sandbox": "1"

View File

@@ -31,9 +31,9 @@ export AWS_SESSION_TOKEN=ZZZZZZZZ
```json
{
"r53_main": {
"TYPE": "ROUTE53",
"KeyId": "$AWS_ACCESS_KEY_ID",
"SecretKey": "$AWS_SECRET_ACCESS_KEY",
"TYPE": "ROUTE53"
"SecretKey": "$AWS_SECRET_ACCESS_KEY"
}
}
```