1
0
mirror of https://github.com/StackExchange/dnscontrol.git synced 2024-05-11 05:55:12 +00:00
Commit Graph

659 Commits

Author SHA1 Message Date
cad8a279a8 fixup! 2020-02-12 20:09:06 -05:00
6680e9e2a7 DOCS: Document release note bprocess 2020-02-12 13:51:00 -05:00
d2625cf17a Using Alias Records breaks DNSControl (#616) 2020-02-07 14:25:08 -05:00
6c4192bf82 Add _mta-sts to labels allowed to have an underscore (#617)
Although _mta-sts is normally used with a TXT record it can
also be used with a CNAME record to delegate the authority.

See sections 3.1 and 8.2 of RFC8461 for details.
2020-02-07 14:20:24 -05:00
450accf0a5 AZURE: Bug: Wrong domain updated in query (#615) 2020-02-05 18:19:24 -05:00
891c4162df Upgrade urfave/cli to v2 (#614)
* Upgrade cli to v2
* Re-vendor
2020-02-03 12:44:11 -05:00
f2c77b6541 linting 2020-02-02 09:50:07 -05:00
fcccb2b9dc LETS_ENCRYPT: Try all cert renewals before returning error. (#611) 2020-01-30 16:29:39 -05:00
e172df2817 Integration testing: Standardize "empty" usage (#612)
* All tests start with an "empty", not end.
* "empty" formatted the same way for all tests.
2020-01-30 10:05:37 -05:00
36a05608e0 DOCS: Explain nameservers vs ns (#608) 2020-01-29 13:47:32 -05:00
92b51dbc65 Update github.com/mjibson/esc (#515)
* Update github.com/mjibson/esc

* Update github.com/mjibson/esc
* Fix generate.go to new signature for esc.Run

* Internal: Upgrade to lastest "esc"
2020-01-29 13:43:25 -05:00
75756136cb RELENG: Doc should list correct version numbers (#607)
* RELENG: Release numbers no longer begin with 0.
2020-01-28 16:59:09 -05:00
071d9377c2 fixup! 2020-01-28 14:38:53 -05:00
88abe122cf Docs: Clarify bug triage process (#606) 2020-01-28 14:36:28 -05:00
6e8d5b59ab Fixed issues from go vet (#605)
* CloudFlare provider is missing quotes on a JSON struct tag.
* ACME package has a unnecessary JSON struct tag.
* Route53 provider has an unreachable return.
2020-01-28 12:10:58 -05:00
825ba2d081 Switch to Go 1.13 error wrapping (#604)
* Replaced errors.Wrap with fmt.Errorf (#589)

* Find:    errors\.Wrap\(([^,]+),\s+(["`][^"`]*)(["`])\)
  Replace: fmt.Errorf($2: %w$3, $1)

* Replaced errors.Wrapf with fmt.Errorf (#589)

* Find:    errors\.Wrapf\(([^,]+),\s+(["`][^"`]*)(["`])\)
  Replace: fmt.Errorf($2: %w$3, $1)
* Find:    errors\.Wrapf\(([^,]+),\s+(["`][^"`]*)(["`])(,[^)]+)\)
* Replace: fmt.Errorf($2: %w$3$4, $1)

* Replaced errors.Errorf with fmt.Errorf (#589)

* Find:    errors\.Errorf
  Replace: fmt.Errorf

* Cleaned up remaining imports

* Cleanup

* Regenerate provider support matrix

This was broken by #533 ... and it's now the third time this has been missed.
2020-01-28 11:06:56 -05:00
cae35a2c8f NAMECHEAP: Add CAA support (#533) 2020-01-28 10:54:58 -05:00
ae3a730e64 Documentation: Add vendoring details. (#596)
* Add vendoring details.

* Address @geek1011's comments.

* fixup!
2020-01-28 10:44:07 -05:00
2f83aa9302 Internals: Switch to v2 go.mod, drop GOPATH, and fix Azure Pipelines (#595)
* Switched to v2 go.mod

Also set GO111MODULE=on in build stuff to always use Go modules
even when in GOPATH.

* Ensure go.mod, go.sum, and vendor are up to date

* Attempt to fix Azure pipelines

* Add set -e to properly fail on exit (it didn't seem to be
  propagating properly before).
* Set workingDirectory for GoFmt and GoGen (this might be why it
  fails unlike compile and unitests).

* Another attempt to fix Azure Pipelines

* Use the Go env template for all go-related jobs.

* Completely fixed Azure Pipelines

* Added a display name to GoFmt for consistency.
* Fixed diffs for GoFmt and GoGen.
* Show git status for checks.

* Drop GOPATH for tests

TODO: Do the same for integration tests.

* Drop GOPATH for integration tests

* Show more diffs

* Regenerate provider support matrix

This wasn't done in #590...
2020-01-28 10:42:31 -05:00
d19eedaa63 DOC: Improve internetbs doc (#603) 2020-01-28 07:44:52 -05:00
2d88d81392 NEW PROVIDER: Internet.bs (#590)
* Ineternet.bs: first version of provider
* Ineternet.bs: code and documentation cleanup
2020-01-27 08:25:20 -05:00
c0a68fae4f Regenerate provider support matrix (fixes #592) (#599)
Also see #595.
2020-01-24 17:20:41 -05:00
bfa36ebbf8 DIGITALOCEAN: CAA is supported with some caveats (#592)
Change the tests to skip test case with CAA `;` value for Digitalocean,
because that specific feature isn't supported.

Closes #588
2020-01-24 12:21:01 -05:00
d3dc5a5eb7 Integration test: Add test for TXT with null string (#597) 2020-01-24 12:10:27 -05:00
262acdd3d8 get-certs: DNS01 challenge skipping preCheckDNS (#591) 2020-01-23 17:54:07 -05:00
28d650207b Improve Lets Encrypt docs (#594)
* Mention certbot
* Link to get-certs.md from the main page
* Rename lets-encrypt.md -> get-certs.md
2020-01-23 17:49:43 -05:00
9857a320a2 Update get-certs docs 2020-01-23 17:42:12 -05:00
f6ce421fdd NEW PROVIDER: GANDI_V5 (deprecates GANDI) (#572)
* GANDI_v5: Add Registrar support
* Add GANDI deprecation warning
* vendor github.com/tiramiseb/go-gandi
2020-01-20 14:13:32 -05:00
2c6878237e go generate 2020-01-20 14:08:09 -05:00
253cd07154 NEW PROVIDER: ClouDNS (#578)
* ClouDNS: first version of provider
* ClouDNS: documentation
* ClouDNS: code cleanup
* ClouDNS: GetNameservers now uses ClouDNS API to fetch NS servers list
* ClouDNS: CAA support
* ClouDNS: TLSA support
* ClouDNS: tests credentials now use variables instead of hardcoded values
* ClouDNS: SSHFP support
* ClouDNS: export only necessary methods
2020-01-20 14:07:38 -05:00
16d0043cce Switch from govendor to go modules. (#587)
Thanks to @BenoitKnecht for leading the way on this.
2020-01-18 14:40:28 -05:00
31188c3a70 ROUTE53: Document Minimum access policy learned from #548 (#586) 2020-01-18 13:31:10 -05:00
35e37ff91f Use ns1.example.com, not ns1.otherdomain.tld, in integration tests 2020-01-14 18:19:53 -05:00
2c0361b0d5 BUG: Correctly spell Cabability (#582) 2020-01-12 11:24:10 -05:00
mm
7df73b187c ROUTE53: Messages don't display correctly in big batch mode (#580)
* fixed description for paginated r53 updates

Signed-off-by: marco.messerschmidt <marco.messerschmidt@zalando.de>

* fixed description for paginated r53 updates

Signed-off-by: marco.messerschmidt <marco.messerschmidt@zalando.de>

* Update route53Provider.go

reset batch site
2020-01-10 08:47:20 -05:00
fcfef4f501 Set Up Choco CI
[skip ci]
2020-01-09 11:46:31 -05:00
d16de32154 ignore nupkgs 2020-01-09 11:44:53 -05:00
6ae19ad4e3 add chocolatey spec 2020-01-09 11:36:52 -05:00
ed48fc6dec bump version to 2.10.0 for semver compliance 2020-01-09 11:29:11 -05:00
88769d51b7 bump version to 2.10 2020-01-02 16:09:19 -05:00
2860a8e4ec FIx newline (#571)
* add gandi to integration tests

* add gandilive too

* reference correct secrets

* add ns1 too

* add DNSIMPLE

* disable failing ones for now

Co-authored-by: Craig Peterson <192540+captncraig@users.noreply.github.com>
2019-12-19 17:07:16 -05:00
f1572c4b11 Docker container now includes the convertzone utility (#570) 2019-12-17 11:24:49 -05:00
eed8e43fbd CLOUDFLARE: Integration tests should use API Token, not user/key (#557)
* providers/cloudflare: Support API tokens

Cloudflare API tokens are a new way to authenticate to Cloudflare API.
Unlike the Global API key, tokens can be given specific permissions to
only access parts of the API. See [1] for details.

[1] https://blog.cloudflare.com/api-tokens-general-availability/

This commit introduces a new credential for cloudflare called
`apitoken`, which is mutually exclusive with `apiuser` and `apikey`.

In order for DNSControl to work with this token, it should have the
right to read DNS zones and edit DNS records.

Closes #534

* CLOUDFLARE: Update integration tests for api token
2019-12-09 14:04:52 -05:00
61c926d5a4 Update integration.yml for Azure Pipelines 2019-12-09 14:04:12 -05:00
df3adef5ec Do some cleanup for AzureDNS code (#551) 2019-12-09 13:51:23 -05:00
0f396cd135 ROUTE53: Add AWS_PROFILE functionality (#567)
* Add AWS_PROFILE functionality for Route53 provider

* Document named profiles authentication option for Route53
2019-12-04 10:17:28 -05:00
b928e7c22f Fix typo in invalid cert name error message (#565)
BUG: validateCertificateList error message has valid spelled wrong.
2019-11-22 08:30:57 -05:00
af4f2464e2 VULTR: Updated govultr to v0.1.7 (#564) 2019-11-14 16:22:37 -05:00
70ce16ff23 Fix handling of SRV records with no target (indicated by ".")
According to the RFC, the way to indicate that a SRV has no target is to set the target to ".".  Some providers do not handle this, or the API returns "" instead of ".".  This situation is now tested in the integration tests and all providers (that support this) have been fixed.



* Cloudflare: Fix decoding empty SRV target (fixes #561)

SRV records with empty (".") targets are now returned as false by
the API, which breaks Unmarshaling it into a string.

* Use custom type for Cloudflare SRV target

Rewrote the SRV target decoding to use a custom type for (un)marshaling, as
Cloudflare returns false for null targets, but it requires a single period
for giving it one. The target code has also been made more flexible to future
API changes with additional normalization.

This has been tested with record creation, deletion, and update and works
as of 2019-11-05.

* DigitalOcean: Fix target FQDN for null targets

Without this, dnscontrol thinks an update is needed (.. != .) even
when the SRV target is correct.

* DNSimple: Fix parsing of null SRV target

DNSimple only returns two fields when the target is null.

* NameDotCom: Add note about not supporting null SRV targets, skip test

* DNSimple: Do not append a . unless we have all three parts

Signed-off-by: Amelia Aronsohn <squirrel@wearing.black>

* Regenerated provider matrix
2019-11-14 11:25:20 -05:00
d48009a621 DOCUMENTATION: Azure DNS dual host support is limited (#560) 2019-10-31 09:44:42 -04:00