add goodroots.work caa_management#634
Conversation
|
Linter OK: |
goodroots.work.caa_management.json
Outdated
| "syncBlock": false, | ||
| "syncPubKeyDomain": "caa.goodroots.work", | ||
| "multiInstance": false, | ||
| "warnPhishing": false, |
There was a problem hiding this comment.
nit: The false boolean values can be removed, the default is false.
kerolasa
left a comment
There was a problem hiding this comment.
Looks good to me, this can be merged with or without the boolean nit fixed.
|
@colin-stubbs 1 important question. Do you intend to set several CAA records for the same domain/host combinations? If yes, please read the section Apply, Re-apply, and Multi-Instance of the spec and take a look if multiInstance flag would be needed. |
|
Yep, multi record definitely needed, it's not uncommon for a domain to want say... 2 issue records, 1 issuewild's, an iodef and possibly some custom tags as well. Thank you I'll read up on that and update. |
|
OK, updated... I get the feeling that we're going to have to pretty extensively test sync vs async and the feature variances between DNS Providers anyway, but multiInstance=true does appear to to be the best approach for now. |
|
@colin-stubbs ok. |
Description
Add the Good Roots Work Domain Connect template to support programmatic management of DNS CAA policy records.
Type of change
Please mark options that are relevant.
How Has This Been Tested?
Please mark the following checks done
<providerId>.<serviceId>.jsonNOTE: Despite all of the Domain Connect documentation describing CAA record support the template linter did not support CAA records yet. I have added support via PR#17
dc-template-linter with added CAA support has no issues with our template,
Example variable values
A set of examples whereby a registered domain (example.com) wishes to, by default, only have certificates issued by DigiCert and would like to receive issuance violation notifications via security@example.com. Yet they have delegated authority to issue a certificate for a specific subdomain name (sub.example.com) to Let's Encrypt only.
Example 1, apex domain, non-critical issue property with additional parameters,
Example 2, apex domain, critical issuewild property with additional parameters,
Example 3, apex domain, non-critical iodef property with additional parameters,
Example 4, sub domain, critical issue property,
Results from https://domainconnect.paulonet.eu/dc/free/templateedit
NOTE: If using https://domainconnect.paulonet.eu/dc/free/templateedit it doesn't currently support CAA records at present, so this was generated as TXT records as they have the same basic format. TXT was substituted to CAA afterwards.