diff --git a/.changelog/0d2c45a64fdc45268b8844c0d2439c6e.md b/.changelog/0d2c45a64fdc45268b8844c0d2439c6e.md new file mode 100644 index 0000000..7872b10 --- /dev/null +++ b/.changelog/0d2c45a64fdc45268b8844c0d2439c6e.md @@ -0,0 +1,4 @@ +--- +type: none +--- +New provider: Azion DNS \ No newline at end of file diff --git a/.changelog/4f9d1e4e41834834a21cd99ef46af928.md b/.changelog/4f9d1e4e41834834a21cd99ef46af928.md new file mode 100644 index 0000000..9833c0a --- /dev/null +++ b/.changelog/4f9d1e4e41834834a21cd99ef46af928.md @@ -0,0 +1,4 @@ +--- +type: minor +--- +Add kwags to filter processors __init__ diff --git a/README.md b/README.md index f561609..636d983 100644 --- a/README.md +++ b/README.md @@ -273,6 +273,7 @@ The table below lists the providers octoDNS supports. They are maintained in the | [Akamai Edge DNS](https://www.akamai.com/products/edge-dns) | [octodns_edgedns](https://github.com/octodns/octodns-edgedns/) | | | [Amazon Route 53](https://aws.amazon.com/route53/) | [octodns_route53](https://github.com/octodns/octodns-route53) | | | [AutoDNS](https://www.internetx.com/autodns/) | [octodns_autodns](https://github.com/octodns/octodns-autodns) | | +| [Azion DNS](https://www.azion.com/en/products/edge-dns/) | [octodns_azion](https://github.com/aziontech/octodns-azion/) | | | [Azure DNS](https://azure.microsoft.com/en-us/services/dns/) | [octodns_azure](https://github.com/octodns/octodns-azure/) | | | [BIND, AXFR, RFC-2136](https://www.isc.org/bind/) | [octodns_bind](https://github.com/octodns/octodns-bind/) | | | [Bunny DNS](https://bunny.net/dns/) | [octodns_bunny](https://github.com/Relkian/octodns-bunny) | | diff --git a/octodns/processor/filter.py b/octodns/processor/filter.py index 638823d..5795234 100644 --- a/octodns/processor/filter.py +++ b/octodns/processor/filter.py @@ -175,8 +175,8 @@ class NameAllowlistFilter(_NameBaseFilter, AllowsMixin): - route53 ''' - def __init__(self, name, allowlist): - super().__init__(name, allowlist) + def __init__(self, name, allowlist, **kwargs): + super().__init__(name, allowlist, **kwargs) class NameRejectlistFilter(_NameBaseFilter, RejectsMixin): @@ -211,8 +211,8 @@ class NameRejectlistFilter(_NameBaseFilter, RejectsMixin): - route53 ''' - def __init__(self, name, rejectlist): - super().__init__(name, rejectlist) + def __init__(self, name, rejectlist, **kwargs): + super().__init__(name, rejectlist, **kwargs) class _ValueBaseFilter(_FilterProcessor): @@ -284,9 +284,9 @@ class ValueAllowlistFilter(_ValueBaseFilter, AllowsMixin): - route53 ''' - def __init__(self, name, allowlist): + def __init__(self, name, allowlist, **kwargs): self.log = getLogger(f'ValueAllowlistFilter[{name}]') - super().__init__(name, allowlist) + super().__init__(name, allowlist, **kwargs) class ValueRejectlistFilter(_ValueBaseFilter, RejectsMixin): @@ -321,9 +321,9 @@ class ValueRejectlistFilter(_ValueBaseFilter, RejectsMixin): - route53 ''' - def __init__(self, name, rejectlist): + def __init__(self, name, rejectlist, **kwargs): self.log = getLogger(f'ValueRejectlistFilter[{name}]') - super().__init__(name, rejectlist) + super().__init__(name, rejectlist, **kwargs) class _NetworkValueBaseFilter(BaseProcessor): @@ -500,6 +500,7 @@ class ZoneNameFilter(_FilterProcessor): # If true a ValidationError will be throw when such records are # encouterd, if false the records will just be ignored/omitted. # (default: true) + # error: True # Optional param that can be set to False to leave the target zone # alone, thus allowing deletion of existing records # (default: true)