mirror of
https://github.com/kubernetes-sigs/external-dns.git
synced 2025-08-06 01:26:59 +02:00
Merge branch 'master' into update-cf-docs
This commit is contained in:
commit
cbccd00d79
18
.github/pull_request_template.md
vendored
18
.github/pull_request_template.md
vendored
@ -1,3 +1,17 @@
|
|||||||
## Checklist
|
<!--
|
||||||
|
Please read https://github.com/kubernetes-sigs/external-dns#contributing before submitting
|
||||||
|
your pull request. Please fill in each section below to help us better prioritize your pull request. Thanks!
|
||||||
|
-->
|
||||||
|
|
||||||
- [ ] Update changelog in CHANGELOG.md, use section "Unreleased".
|
**Description**
|
||||||
|
|
||||||
|
<!-- Please provide a summary of the change here. -->
|
||||||
|
|
||||||
|
<!-- Please link to all GitHub issue that this pull request implements(i.e. Fixes #123) -->
|
||||||
|
Fixes #ISSUE
|
||||||
|
|
||||||
|
**Checklist**
|
||||||
|
|
||||||
|
- [ ] Unit tests updated
|
||||||
|
- [ ] End user documentation updated
|
||||||
|
- [ ] CHANGELOG.md updated, use section "Unreleased"
|
||||||
|
@ -1,9 +1,13 @@
|
|||||||
## Unreleased
|
## Unreleased
|
||||||
|
|
||||||
|
- Enhance pull request template @seanmalloy
|
||||||
- Improve errors context for AWS provider
|
- Improve errors context for AWS provider
|
||||||
- Scaleway Provider (#1643) @Sh4d1
|
- Scaleway Provider (#1643) @Sh4d1
|
||||||
- Fix typos in documentation @ddymko
|
- Fix typos in documentation @ddymko
|
||||||
- Add Cloudflare documentation on use of `--zone-id-filter` (#1751) @loozhengyuan
|
- Add Cloudflare documentation on use of `--zone-id-filter` (#1751) @loozhengyuan
|
||||||
|
- Fix: alibaba cloud keeping create record (#1682) @LXM
|
||||||
|
- Update all container registry references to use k8s.gcr.io @seanmalloy
|
||||||
|
- Provide available prometheus metrics in documentation @vinny-sabatini
|
||||||
|
|
||||||
## v0.7.3 - 2020-08-05
|
## v0.7.3 - 2020-08-05
|
||||||
|
|
||||||
|
20
docs/faq.md
20
docs/faq.md
@ -189,6 +189,16 @@ In case of an increased error count, you could correlate them with the `http_req
|
|||||||
|
|
||||||
You can use the host label in the metric to figure out if the request was against the Kubernetes API server (Source errors) or the DNS provider API (Registry/Provider errors).
|
You can use the host label in the metric to figure out if the request was against the Kubernetes API server (Source errors) or the DNS provider API (Registry/Provider errors).
|
||||||
|
|
||||||
|
Here is the full list of available metrics provided by ExternalDNS:
|
||||||
|
|
||||||
|
| Name | Description | Type |
|
||||||
|
|-----------------------------------------------------|---------------------------------------------------------|---------|
|
||||||
|
| external_dns_controller_last_sync_timestamp_seconds | Timestamp of last successful sync with the DNS provider | Gauge |
|
||||||
|
| external_dns_registry_endpoints_total | Number of Endpoints in all sources | Gauge |
|
||||||
|
| external_dns_registry_errors_total | Number of Registry errors | Counter |
|
||||||
|
| external_dns_source_endpoints_total | Number of Endpoints in the registry | Gauge |
|
||||||
|
| external_dns_source_errors_total | Number of Source errors | Counter |
|
||||||
|
|
||||||
### How can I run ExternalDNS under a specific GCP Service Account, e.g. to access DNS records in other projects?
|
### How can I run ExternalDNS under a specific GCP Service Account, e.g. to access DNS records in other projects?
|
||||||
|
|
||||||
Have a look at https://github.com/linki/mate/blob/v0.6.2/examples/google/README.md#permissions
|
Have a look at https://github.com/linki/mate/blob/v0.6.2/examples/google/README.md#permissions
|
||||||
@ -204,10 +214,11 @@ $ docker run \
|
|||||||
-e EXTERNAL_DNS_SOURCE=$'service\ningress' \
|
-e EXTERNAL_DNS_SOURCE=$'service\ningress' \
|
||||||
-e EXTERNAL_DNS_PROVIDER=google \
|
-e EXTERNAL_DNS_PROVIDER=google \
|
||||||
-e EXTERNAL_DNS_DOMAIN_FILTER=$'foo.com\nbar.com' \
|
-e EXTERNAL_DNS_DOMAIN_FILTER=$'foo.com\nbar.com' \
|
||||||
registry.opensource.zalan.do/teapot/external-dns:latest
|
k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
time="2017-08-08T14:10:26Z" level=info msg="config: &{APIServerURL: KubeConfig: Sources:[service ingress] Namespace: ...
|
time="2017-08-08T14:10:26Z" level=info msg="config: &{APIServerURL: KubeConfig: Sources:[service ingress] Namespace: ...
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
Locally:
|
Locally:
|
||||||
|
|
||||||
```console
|
```console
|
||||||
@ -272,17 +283,16 @@ Separate them by `,`.
|
|||||||
|
|
||||||
### Are there official Docker images provided?
|
### Are there official Docker images provided?
|
||||||
|
|
||||||
When we tag a new release, we push a Docker image on Zalando's public Docker registry with the following name:
|
When we tag a new release, we push a container image to the Kubernetes projects official container registry with the following name:
|
||||||
|
|
||||||
```
|
```
|
||||||
registry.opensource.zalan.do/teapot/external-dns
|
k8s.gcr.io/external-dns/external-dns
|
||||||
```
|
```
|
||||||
|
|
||||||
As tags, you can use your version of choice or use `latest` that always resolves to the latest tag.
|
As tags, you use the external-dns release of choice(i.e. `v0.7.3`). A `latest` tag is not provided in the container registry.
|
||||||
|
|
||||||
If you wish to build your own image, you can use the provided [Dockerfile](../Dockerfile) as a starting point.
|
If you wish to build your own image, you can use the provided [Dockerfile](../Dockerfile) as a starting point.
|
||||||
|
|
||||||
We are currently working with the Kubernetes community to provide official images for the project similarly to what is done with the other official Kubernetes projects, but we don't have an ETA on when those images will be available.
|
|
||||||
|
|
||||||
### Why am I seeing time out errors even though I have connectivity to my cluster?
|
### Why am I seeing time out errors even though I have connectivity to my cluster?
|
||||||
|
|
||||||
|
@ -49,7 +49,7 @@ spec:
|
|||||||
# serviceAccountName: external-dns
|
# serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: eu.gcr.io/k8s-artifacts-prod/external-dns/external-dns:v0.6.0
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=ingress # or service or both
|
- --source=ingress # or service or both
|
||||||
- --provider=akamai
|
- --provider=akamai
|
||||||
|
@ -113,7 +113,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
@ -187,7 +187,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
|
@ -81,7 +81,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
env:
|
env:
|
||||||
- name: AWS_REGION
|
- name: AWS_REGION
|
||||||
value: us-east-1 # put your CloudMap NameSpace region
|
value: us-east-1 # put your CloudMap NameSpace region
|
||||||
@ -148,7 +148,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
env:
|
env:
|
||||||
- name: AWS_REGION
|
- name: AWS_REGION
|
||||||
value: us-east-1 # put your CloudMap NameSpace region
|
value: us-east-1 # put your CloudMap NameSpace region
|
||||||
|
@ -141,7 +141,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
@ -216,7 +216,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
|
@ -167,7 +167,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: externaldns
|
- name: externaldns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
@ -237,7 +237,7 @@ spec:
|
|||||||
serviceAccountName: externaldns
|
serviceAccountName: externaldns
|
||||||
containers:
|
containers:
|
||||||
- name: externaldns
|
- name: externaldns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
@ -307,7 +307,7 @@ spec:
|
|||||||
serviceAccountName: externaldns
|
serviceAccountName: externaldns
|
||||||
containers:
|
containers:
|
||||||
- name: externaldns
|
- name: externaldns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
|
@ -191,7 +191,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
@ -261,7 +261,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
@ -331,7 +331,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
|
@ -50,7 +50,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
@ -118,7 +118,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
|
@ -21,7 +21,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
@ -91,7 +91,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
|
@ -108,7 +108,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
- --provider=coredns
|
- --provider=coredns
|
||||||
@ -175,7 +175,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
- --provider=coredns
|
- --provider=coredns
|
||||||
|
@ -59,7 +59,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
@ -136,7 +136,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
|
@ -43,7 +43,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
@ -107,7 +107,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
|
@ -35,7 +35,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone you create in DNSimple.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone you create in DNSimple.
|
||||||
@ -100,7 +100,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone you create in DNSimple.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone you create in DNSimple.
|
||||||
|
@ -43,7 +43,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
- --txt-prefix=_d
|
- --txt-prefix=_d
|
||||||
|
@ -41,7 +41,7 @@ spec:
|
|||||||
# serviceAccountName: external-dns
|
# serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: eu.gcr.io/k8s-artifacts-prod/external-dns/external-dns:v0.6.0
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=ingress # or service or both
|
- --source=ingress # or service or both
|
||||||
- --provider=exoscale
|
- --provider=exoscale
|
||||||
|
@ -27,7 +27,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --log-level=debug
|
- --log-level=debug
|
||||||
- --source=service
|
- --source=service
|
||||||
|
@ -91,7 +91,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
@ -157,7 +157,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
|
@ -43,7 +43,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: eu.gcr.io/k8s-artifacts-prod/external-dns/external-dns:v0.7.3
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
@ -107,7 +107,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
|
@ -31,7 +31,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --log-level=debug
|
- --log-level=debug
|
||||||
- --source=service
|
- --source=service
|
||||||
@ -96,7 +96,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --log-level=debug
|
- --log-level=debug
|
||||||
- --source=service
|
- --source=service
|
||||||
|
@ -69,7 +69,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains.
|
- --domain-filter=example.com # (optional) limit to only example.com domains.
|
||||||
@ -149,7 +149,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains.
|
- --domain-filter=example.com # (optional) limit to only example.com domains.
|
||||||
|
@ -28,7 +28,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
@ -98,7 +98,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
|
@ -41,7 +41,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
@ -105,7 +105,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
|
@ -262,7 +262,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
- --domain-filter=external-dns-test.gcp.zalan.do
|
- --domain-filter=external-dns-test.gcp.zalan.do
|
||||||
|
@ -61,7 +61,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
@ -125,7 +125,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
|
@ -25,7 +25,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=openshift-route
|
- --source=openshift-route
|
||||||
- --domain-filter=external-dns-test.my-org.com # will make ExternalDNS see only the hosted zones matching provided domain, omit to process all available hosted zones
|
- --domain-filter=external-dns-test.my-org.com # will make ExternalDNS see only the hosted zones matching provided domain, omit to process all available hosted zones
|
||||||
@ -92,7 +92,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=openshift-route
|
- --source=openshift-route
|
||||||
- --domain-filter=external-dns-test.my-org.com # will make ExternalDNS see only the hosted zones matching provided domain, omit to process all available hosted zones
|
- --domain-filter=external-dns-test.my-org.com # will make ExternalDNS see only the hosted zones matching provided domain, omit to process all available hosted zones
|
||||||
|
@ -93,7 +93,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
|
@ -86,7 +86,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
@ -157,7 +157,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
|
@ -42,7 +42,7 @@ spec:
|
|||||||
# serviceAccountName: external-dns
|
# serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # or ingress or both
|
- --source=service # or ingress or both
|
||||||
- --provider=pdns
|
- --provider=pdns
|
||||||
|
@ -243,7 +243,7 @@ spec:
|
|||||||
- --txt-owner-id=external-dns
|
- --txt-owner-id=external-dns
|
||||||
- --annotation-filter=kubernetes.io/ingress.class=external-ingress
|
- --annotation-filter=kubernetes.io/ingress.class=external-ingress
|
||||||
- --aws-zone-type=public
|
- --aws-zone-type=public
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
name: external-dns-public
|
name: external-dns-public
|
||||||
```
|
```
|
||||||
|
|
||||||
@ -281,7 +281,7 @@ spec:
|
|||||||
- --txt-owner-id=dev.k8s.nexus
|
- --txt-owner-id=dev.k8s.nexus
|
||||||
- --annotation-filter=kubernetes.io/ingress.class=internal-ingress
|
- --annotation-filter=kubernetes.io/ingress.class=internal-ingress
|
||||||
- --aws-zone-type=private
|
- --aws-zone-type=private
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
name: external-dns-private
|
name: external-dns-private
|
||||||
```
|
```
|
||||||
|
|
||||||
|
@ -53,7 +53,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
@ -120,7 +120,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
|
@ -54,7 +54,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
- --provider=rdns
|
- --provider=rdns
|
||||||
@ -123,7 +123,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
- --provider=rdns
|
- --provider=rdns
|
||||||
|
@ -217,7 +217,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: eu.gcr.io/k8s-artifacts-prod/external-dns/external-dns:v0.6.0
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --txt-owner-id=k8s
|
- --txt-owner-id=k8s
|
||||||
- --provider=rfc2136
|
- --provider=rfc2136
|
||||||
@ -257,7 +257,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: eu.gcr.io/k8s-artifacts-prod/external-dns/external-dns:v0.6.0
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --txt-owner-id=k8s
|
- --txt-owner-id=k8s
|
||||||
- --provider=rfc2136
|
- --provider=rfc2136
|
||||||
|
@ -53,7 +53,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
@ -121,7 +121,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
|
@ -20,7 +20,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: eu.gcr.io/k8s-artifacts-prod/external-dns/external-dns:v0.6.0 # minimum version is v0.5.6
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- ... # your arguments here
|
- ... # your arguments here
|
||||||
securityContext:
|
securityContext:
|
||||||
|
@ -36,7 +36,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains
|
- --domain-filter=example.com # (optional) limit to only example.com domains
|
||||||
@ -107,7 +107,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains
|
- --domain-filter=example.com # (optional) limit to only example.com domains
|
||||||
|
@ -44,7 +44,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress # ingress is also possible
|
- --source=ingress # ingress is also possible
|
||||||
@ -116,7 +116,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
|
@ -66,7 +66,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --provider=vinyldns
|
- --provider=vinyldns
|
||||||
- --source=service
|
- --source=service
|
||||||
@ -137,7 +137,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --provider=vinyldns
|
- --provider=vinyldns
|
||||||
- --source=service
|
- --source=service
|
||||||
|
@ -42,7 +42,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
@ -106,7 +106,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: registry.opensource.zalan.do/teapot/external-dns:latest
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service # ingress is also possible
|
- --source=service # ingress is also possible
|
||||||
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
- --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above.
|
||||||
|
@ -16,7 +16,7 @@ spec:
|
|||||||
serviceAccountName: external-dns
|
serviceAccountName: external-dns
|
||||||
containers:
|
containers:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
image: us.gcr.io/k8s-artifacts-prod/external-dns/external-dns:v0.7.3
|
image: k8s.gcr.io/external-dns/external-dns:v0.7.3
|
||||||
args:
|
args:
|
||||||
- --source=service
|
- --source=service
|
||||||
- --source=ingress
|
- --source=ingress
|
||||||
|
@ -42,7 +42,6 @@ type Config struct {
|
|||||||
APIServerURL string
|
APIServerURL string
|
||||||
KubeConfig string
|
KubeConfig string
|
||||||
RequestTimeout time.Duration
|
RequestTimeout time.Duration
|
||||||
IstioIngressGatewayServices []string
|
|
||||||
ContourLoadBalancerService string
|
ContourLoadBalancerService string
|
||||||
SkipperRouteGroupVersion string
|
SkipperRouteGroupVersion string
|
||||||
Sources []string
|
Sources []string
|
||||||
|
@ -326,10 +326,6 @@ func (p *AlibabaCloudProvider) recordsForDNS() (endpoints []*endpoint.Endpoint,
|
|||||||
recordType := recordList[0].Type
|
recordType := recordList[0].Type
|
||||||
ttl := recordList[0].TTL
|
ttl := recordList[0].TTL
|
||||||
|
|
||||||
if ttl == defaultAlibabaCloudRecordTTL {
|
|
||||||
ttl = 0
|
|
||||||
}
|
|
||||||
|
|
||||||
var targets []string
|
var targets []string
|
||||||
for _, record := range recordList {
|
for _, record := range recordList {
|
||||||
target := record.Value
|
target := record.Value
|
||||||
|
@ -276,6 +276,12 @@ func TestAlibabaCloudProvider_Records(t *testing.T) {
|
|||||||
|
|
||||||
func TestAlibabaCloudProvider_ApplyChanges(t *testing.T) {
|
func TestAlibabaCloudProvider_ApplyChanges(t *testing.T) {
|
||||||
p := newTestAlibabaCloudProvider(false)
|
p := newTestAlibabaCloudProvider(false)
|
||||||
|
defaultTtlPlan := &endpoint.Endpoint{
|
||||||
|
DNSName: "ttl.container-service.top",
|
||||||
|
RecordType: "A",
|
||||||
|
RecordTTL: defaultAlibabaCloudRecordTTL,
|
||||||
|
Targets: endpoint.NewTargets("4.3.2.1"),
|
||||||
|
}
|
||||||
changes := plan.Changes{
|
changes := plan.Changes{
|
||||||
Create: []*endpoint.Endpoint{
|
Create: []*endpoint.Endpoint{
|
||||||
{
|
{
|
||||||
@ -284,6 +290,7 @@ func TestAlibabaCloudProvider_ApplyChanges(t *testing.T) {
|
|||||||
RecordTTL: 300,
|
RecordTTL: 300,
|
||||||
Targets: endpoint.NewTargets("4.3.2.1"),
|
Targets: endpoint.NewTargets("4.3.2.1"),
|
||||||
},
|
},
|
||||||
|
defaultTtlPlan,
|
||||||
},
|
},
|
||||||
UpdateNew: []*endpoint.Endpoint{
|
UpdateNew: []*endpoint.Endpoint{
|
||||||
{
|
{
|
||||||
@ -308,13 +315,20 @@ func TestAlibabaCloudProvider_ApplyChanges(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Errorf("Failed to get records: %v", err)
|
t.Errorf("Failed to get records: %v", err)
|
||||||
} else {
|
} else {
|
||||||
if len(endpoints) != 2 {
|
if len(endpoints) != 3 {
|
||||||
t.Errorf("Incorrect number of records: %d", len(endpoints))
|
t.Errorf("Incorrect number of records: %d", len(endpoints))
|
||||||
}
|
}
|
||||||
for _, endpoint := range endpoints {
|
for _, endpoint := range endpoints {
|
||||||
t.Logf("Endpoint for %++v", *endpoint)
|
t.Logf("Endpoint for %++v", *endpoint)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
for _, ep := range endpoints {
|
||||||
|
if ep.DNSName == defaultTtlPlan.DNSName {
|
||||||
|
if ep.RecordTTL != defaultTtlPlan.RecordTTL {
|
||||||
|
t.Error("default ttl execute error")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestAlibabaCloudProvider_Records_PrivateZone(t *testing.T) {
|
func TestAlibabaCloudProvider_Records_PrivateZone(t *testing.T) {
|
||||||
|
@ -30,6 +30,7 @@ import (
|
|||||||
"github.com/aws/aws-sdk-go/aws/session"
|
"github.com/aws/aws-sdk-go/aws/session"
|
||||||
"github.com/aws/aws-sdk-go/service/route53"
|
"github.com/aws/aws-sdk-go/service/route53"
|
||||||
"github.com/linki/instrumented_http"
|
"github.com/linki/instrumented_http"
|
||||||
|
"github.com/pkg/errors"
|
||||||
log "github.com/sirupsen/logrus"
|
log "github.com/sirupsen/logrus"
|
||||||
|
|
||||||
"sigs.k8s.io/external-dns/endpoint"
|
"sigs.k8s.io/external-dns/endpoint"
|
||||||
@ -168,7 +169,7 @@ func NewAWSProvider(awsConfig AWSConfig) (*AWSProvider, error) {
|
|||||||
SharedConfigState: session.SharedConfigEnable,
|
SharedConfigState: session.SharedConfigEnable,
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to instantiate AWS session: %w", err)
|
return nil, errors.Wrap(err, "failed to instantiate AWS session")
|
||||||
}
|
}
|
||||||
|
|
||||||
if awsConfig.AssumeRole != "" {
|
if awsConfig.AssumeRole != "" {
|
||||||
@ -231,10 +232,10 @@ func (p *AWSProvider) Zones(ctx context.Context) (map[string]*route53.HostedZone
|
|||||||
|
|
||||||
err := p.client.ListHostedZonesPagesWithContext(ctx, &route53.ListHostedZonesInput{}, f)
|
err := p.client.ListHostedZonesPagesWithContext(ctx, &route53.ListHostedZonesInput{}, f)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to list hosted zones: %w", err)
|
return nil, errors.Wrap(err, "failed to list hosted zones")
|
||||||
}
|
}
|
||||||
if tagErr != nil {
|
if tagErr != nil {
|
||||||
return nil, fmt.Errorf("failed to list zones tags: %w", tagErr)
|
return nil, errors.Wrap(tagErr, "failed to list zones tags")
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, zone := range zones {
|
for _, zone := range zones {
|
||||||
@ -257,7 +258,7 @@ func wildcardUnescape(s string) string {
|
|||||||
func (p *AWSProvider) Records(ctx context.Context) (endpoints []*endpoint.Endpoint, _ error) {
|
func (p *AWSProvider) Records(ctx context.Context) (endpoints []*endpoint.Endpoint, _ error) {
|
||||||
zones, err := p.Zones(ctx)
|
zones, err := p.Zones(ctx)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("records retrieval failed: %w", err)
|
return nil, errors.Wrap(err, "records retrieval failed")
|
||||||
}
|
}
|
||||||
|
|
||||||
return p.records(ctx, zones)
|
return p.records(ctx, zones)
|
||||||
@ -341,7 +342,7 @@ func (p *AWSProvider) records(ctx context.Context, zones map[string]*route53.Hos
|
|||||||
}
|
}
|
||||||
|
|
||||||
if err := p.client.ListResourceRecordSetsPagesWithContext(ctx, params, f); err != nil {
|
if err := p.client.ListResourceRecordSetsPagesWithContext(ctx, params, f); err != nil {
|
||||||
return nil, fmt.Errorf("failed to list resource records sets for zone %s: %w", *z.Id, err)
|
return nil, errors.Wrapf(err, "failed to list resource records sets for zone %s", *z.Id)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -366,7 +367,7 @@ func (p *AWSProvider) DeleteRecords(ctx context.Context, endpoints []*endpoint.E
|
|||||||
func (p *AWSProvider) doRecords(ctx context.Context, action string, endpoints []*endpoint.Endpoint) error {
|
func (p *AWSProvider) doRecords(ctx context.Context, action string, endpoints []*endpoint.Endpoint) error {
|
||||||
zones, err := p.Zones(ctx)
|
zones, err := p.Zones(ctx)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to list zones, aborting %s doRecords action: %w", action, err)
|
return errors.Wrapf(err, "failed to list zones, aborting %s doRecords action", action)
|
||||||
}
|
}
|
||||||
|
|
||||||
records, err := p.records(ctx, zones)
|
records, err := p.records(ctx, zones)
|
||||||
@ -380,7 +381,7 @@ func (p *AWSProvider) doRecords(ctx context.Context, action string, endpoints []
|
|||||||
func (p *AWSProvider) ApplyChanges(ctx context.Context, changes *plan.Changes) error {
|
func (p *AWSProvider) ApplyChanges(ctx context.Context, changes *plan.Changes) error {
|
||||||
zones, err := p.Zones(ctx)
|
zones, err := p.Zones(ctx)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to list zones, not applying changes: %w", err)
|
return errors.Wrap(err, "failed to list zones, not applying changes")
|
||||||
}
|
}
|
||||||
|
|
||||||
records, ok := ctx.Value(provider.RecordsContextKey).([]*endpoint.Endpoint)
|
records, ok := ctx.Value(provider.RecordsContextKey).([]*endpoint.Endpoint)
|
||||||
@ -455,7 +456,7 @@ func (p *AWSProvider) submitChanges(ctx context.Context, changes []*route53.Chan
|
|||||||
}
|
}
|
||||||
|
|
||||||
if len(failedZones) > 0 {
|
if len(failedZones) > 0 {
|
||||||
return fmt.Errorf("failed to submit all changes for the following zones: %v", failedZones)
|
return errors.Errorf("failed to submit all changes for the following zones: %v", failedZones)
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
@ -583,7 +584,7 @@ func (p *AWSProvider) tagsForZone(ctx context.Context, zoneID string) (map[strin
|
|||||||
ResourceId: aws.String(zoneID),
|
ResourceId: aws.String(zoneID),
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to list tags for zone %s: %w", zoneID, err)
|
return nil, errors.Wrapf(err, "failed to list tags for zone %s", zoneID)
|
||||||
}
|
}
|
||||||
tagMap := map[string]string{}
|
tagMap := map[string]string{}
|
||||||
for _, tag := range response.ResourceTagSet.Tags {
|
for _, tag := range response.ResourceTagSet.Tags {
|
||||||
|
Loading…
Reference in New Issue
Block a user