-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Alias domain #175
Alias domain #175
Conversation
Codecov Report
@@ Coverage Diff @@
## master #175 +/- ##
==========================================
- Coverage 86.94% 86.89% -0.06%
==========================================
Files 19 19
Lines 1088 1091 +3
==========================================
+ Hits 946 948 +2
- Misses 142 143 +1
Continue to review full report at Codecov.
|
Before diving into the details, a big thank you, @aphexer, for posting this, and for including the link to that document/page at LE. I wish that had been around back when I was setting up something similar (on a smaller scale than they suggest). I like the idea, but this simple, minimally invasive, implementation has a few problems. Beginning with the fact that it simply can't work without modifying each of the existing DNS providers to accept and pass through the alias_domain parameter. :-( And that's not the only modification that would be needed to these legacy drivers, since they always add the All of these things suggest to me that this is a feature that will be added for the unified provider that's landed in master since you posted this. My hidden agenda with doing it this way is that alias support makes a nice carrot to encourage authors to migrate those legacy providers to the new interface. :-) I'm going to keep this in mind but not do any implementation until I can get 0.8.2 out. The code is done, aside from the last polishing, and I've been working on documentation this weekend... except when writing the docs for something makes me revisit the code. |
Plans are just predictions, and predictions are often... changed. In the end, it was a small change in the UnifiedProvider bundle of stuff, but it's going to require porting the legacy DNS provider to the new-model interface and then using the new alias support calls in the driver. Want to look at #178 and let me know if this looks like it will resolve your issue (when the driver you're using gets migrated, of course - leaving that for after 0.8.2 gets released). Thanks! |
Closing this, as the issue is resolved - it just needs a bunch of per-driver work by someone who can test that the changes work.... or even make sense in the driver's context (eg., would an AWS customer (using route53 driver) ever need aliasing?) |
Thank you for contributing to sewer.
Every contribution to sewer is important to us.
You may not know it, but you have just contributed to making the world a more safer and secure place.
Contributor offers to license certain software (a “Contribution” or multiple
“Contributions”) to sewer, and sewer agrees to accept said Contributions,
under the terms of the MIT License.
Contributor understands and agrees that sewer shall have the irrevocable and perpetual right to make
and distribute copies of any Contribution, as well as to create and distribute collective works and
derivative works of any Contribution, under the MIT License.
Now,
What(What have you changed?)
Add support for alias domains.
Why(Why did you change it?)
See https://letsencrypt.org/2019/10/09/onboarding-your-customers-with-lets-encrypt-and-acme.html