mirror of
https://github.com/StackExchange/dnscontrol.git
synced 2026-01-17 21:51:08 +08:00
CLOUDFLAREAPI: Enable inserting DS records at the domain apex (even if they may be rejected) (#3571)
This commit is contained in:
parent
97bbc80b2a
commit
5e4d68b41c
4 changed files with 8 additions and 2 deletions
|
|
@ -385,6 +385,11 @@ Please notice that if _any_ `CF_WORKER_ROUTE` function is used then `dnscontrol`
|
|||
Worker Routes for the domain. To be clear: this means it will delete existing routes that
|
||||
were created outside of DNSControl.
|
||||
|
||||
## DS records
|
||||
|
||||
Cloudflare has restrictions that may result in DNSControl's attempt to insert
|
||||
DS records to fail.
|
||||
|
||||
## Integration testing
|
||||
|
||||
The integration tests assume that Cloudflare Workers are enabled and the credentials used
|
||||
|
|
@ -399,7 +404,6 @@ go test -v -verbose -profile CLOUDFLAREAPI -cfworkers=false
|
|||
|
||||
When `-cfworkers=false` is set, tests related to Workers are skipped. The Account ID is not required.
|
||||
|
||||
|
||||
## Cloudflare special TTLs
|
||||
|
||||
Cloudflare plays tricks with TTLs. Cloudflare uses "1" to mean "auto-ttl";
|
||||
|
|
|
|||
|
|
@ -21,7 +21,7 @@ If a feature is definitively not supported for whatever reason, we would also li
|
|||
| [`AZURE_PRIVATE_DNS`](azure_private_dns.md) | ✅ | ✅ | ❌ | ❔ | ❌ | ❌ | ❔ | ❔ | ❌ | ❌ | ✅ | ❔ | ✅ | ❌ | ❔ | ❌ | ❔ | ❔ | ❔ | ❔ | ✅ | ✅ | ✅ |
|
||||
| [`BIND`](bind.md) | ✅ | ✅ | ❌ | ✅ | ❔ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
|
||||
| [`BUNNY_DNS`](bunny_dns.md) | ❌ | ✅ | ❌ | ❔ | ✅ | ✅ | ✅ | ❔ | ❌ | ❌ | ✅ | ❌ | ✅ | ❌ | ❔ | ❌ | ❌ | ❌ | ❔ | ❔ | ❌ | ✅ | ✅ |
|
||||
| [`CLOUDFLAREAPI`](cloudflareapi.md) | ✅ | ✅ | ❌ | ✅ | ✅ | ✅ | ❔ | ✅ | ❌ | ✅ | ✅ | ❔ | ✅ | ✅ | ✅ | ✅ | ❔ | ❔ | ❔ | ❌ | ❌ | ✅ | ✅ |
|
||||
| [`CLOUDFLAREAPI`](cloudflareapi.md) | ✅ | ✅ | ❌ | ✅ | ✅ | ✅ | ❔ | ✅ | ❌ | ✅ | ✅ | ❔ | ✅ | ✅ | ✅ | ✅ | ✅ | ❔ | ❔ | ❌ | ❌ | ✅ | ✅ |
|
||||
| [`CLOUDNS`](cloudns.md) | ❌ | ✅ | ❌ | ✅ | ✅ | ✅ | ✅ | ❔ | ✅ | ❔ | ✅ | ❔ | ✅ | ✅ | ❔ | ✅ | ❔ | ❔ | ✅ | ❔ | ❔ | ✅ | ✅ |
|
||||
| [`CNR`](cnr.md) | ❌ | ✅ | ✅ | ✅ | ✅ | ✅ | ❔ | ❌ | ❌ | ✅ | ✅ | ❌ | ✅ | ✅ | ❌ | ✅ | ❔ | ❌ | ❌ | ❔ | ✅ | ✅ | ✅ |
|
||||
| [`CSCGLOBAL`](cscglobal.md) | ✅ | ✅ | ✅ | ✅ | ❔ | ✅ | ❔ | ❔ | ❔ | ❔ | ❔ | ❔ | ✅ | ❔ | ❔ | ❔ | ❔ | ❔ | ❔ | ❔ | ❔ | ❌ | ✅ |
|
||||
|
|
|
|||
|
|
@ -795,6 +795,7 @@ func makeTests() []*TestGroup {
|
|||
|
||||
testgroup("DS",
|
||||
requires(providers.CanUseDS),
|
||||
not("CLOUDFLAREAPI"),
|
||||
// Use a valid digest value here. Some providers verify that a valid digest is in use. See RFC 4034 and
|
||||
// https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml
|
||||
// https://www.iana.org/assignments/ds-rr-types/ds-rr-types.xhtml
|
||||
|
|
|
|||
|
|
@ -50,6 +50,7 @@ var features = providers.DocumentationNotes{
|
|||
providers.CanUseAlias: providers.Can("CF automatically flattens CNAME records into A records dynamically"),
|
||||
providers.CanUseCAA: providers.Can(),
|
||||
providers.CanUseDNSKEY: providers.Cannot(),
|
||||
providers.CanUseDS: providers.Can(),
|
||||
providers.CanUseDSForChildren: providers.Can(),
|
||||
providers.CanUseHTTPS: providers.Can(),
|
||||
providers.CanUseLOC: providers.Cannot(),
|
||||
|
|
|
|||
Loading…
Add table
Reference in a new issue