Skip to content

Commit 2f5f4c6

Browse files
committed
Add to README: About the DomainKeys Identified Mail (DKIM) DNS record
1 parent 11bab54 commit 2f5f4c6

1 file changed

Lines changed: 5 additions & 1 deletion

File tree

README.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,14 +37,18 @@ When you create a Route53 hosted zone for your domain, you have to update the na
3737

3838
You can use the `dig` command to verify the name servers have been propagated (at least to your location). For example, the following command should return the same NS as the ones shown in the Route53 hosted zone:
3939

40-
`dig NS iporaitech.com +short`
40+
`dig NS mydomain.com +short`
4141

4242
Operations that require Route53 DNS records will timeout if the NS records returned by the DNS query are not the same as the ones in the hosted zone, for example, the ACM certificate validation from the terraform-aws-route53-cert module.
4343

4444
> In my experience, with US and PY based DNS registrars, ACM (us-east-1) was able to validate certificates ~1 hour or so after updating the NS in the registrar ... maybe affected by me running `dig` from my side to get the expected CNAME answer (?) 🤔.
4545
4646
### About the DomainKeys Identified Mail (DKIM) DNS record
4747

48+
A single string in a TXT record has a 255-character limit, but the 2048-bit DKIM value from Gmail can be around 400 characters.
49+
50+
The `aws_route53_record.dkim` created in this repository is an example of how to workaround this limit.
51+
4852
## Deployment
4953

5054
The deploy process is encoded in the [Build and deploy](.github/workflows/deploy.yml) GitHub Actions workflow, basically:

0 commit comments

Comments
 (0)