Commit Graph

383 Commits

Author SHA1 Message Date
Megum1n
4ed7b2888d
Fix struct indentation 2024-02-07 16:29:51 +01:00
Megum1n
7d3d355175
Merge branch 'master' into aws-provider-validate-value-size 2024-02-07 16:27:36 +01:00
thiagoluiznunes
ca4f3ae12b fix(aws-provider): add aws-zone-match-parent flag value to aws config 2024-02-06 18:36:06 -03:00
Kubernetes Prow Robot
97a8fa3195
Merge pull request #4076 from k8r-io/fix-hangs-on-traefik-listeners
Fix timeout for traefik-proxy source
2023-12-27 17:22:52 +01:00
Megum1n
c391f5588a
Validate AWS record values size during batch set generation 2023-12-19 10:21:47 +01:00
Manuel Rüger
28c3153826 webhook: Move httpapi into own package
Signed-off-by: Manuel Rüger <manuel@rueg.eu>
2023-11-30 21:59:00 +01:00
Kristopher Kirkland
9015377c12 Add flags to disable each of the Traefik API groups 2023-11-29 12:14:59 -06:00
Anders Swanson
dbaca73de2 oracle provider: dns zone cache
Signed-off-by: Anders Swanson <anders.swanson@oracle.com>
2023-11-14 12:59:45 -08:00
Anders Swanson
4eb71536e1 OCI Provider private zone and workload identity support 2023-10-17 10:55:11 -07:00
John Gardiner Myers
627f9b1a00 Remove the --run-aws-provider-as-webhook flag 2023-09-27 23:21:33 -07:00
John Gardiner Myers
859892fc72
Add --webhook-server flag for running as a webhook server (#3957)
* Add --webhook-server flag for running as a webhook server

* Address review comment
2023-09-27 07:40:09 -07:00
Raffaele Di Fazio
8251b6dd85
Webhook provider (#3063)
* initial plugin implementation

* rename to webhook

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* json encoder changes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* addressing review comments

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* changes according to ionos review

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix to accomodate changes in master

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fixes to accomodate master changes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* remove all propertyvaluesequals leftovers

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* readd negotiation to pass the domain filter around

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix domain filter passing

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* webhook fixes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix tests

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix docs

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* docs fixes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* code review comments on json unmarshal

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* handle error in adjustendpoints

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix a bunch of wrong require

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* tests and docs

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix typo

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

---------

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
2023-09-25 01:14:58 -07:00
Kubernetes Prow Robot
e0405a2e60
Merge pull request #3748 from johngmyers/exclude-managed
Add --exclude-record-types flag
2023-09-18 22:37:49 -07:00
Kubernetes Prow Robot
d54fa589c2
Merge pull request #3480 from Megum1n/gloo-multiple-namespaces
Add support for multiple gloo namespaces in one External DNS instance
2023-09-15 22:10:13 -07:00
John Gardiner Myers
94713c20c6 Add --exclude-record-types flag 2023-09-15 18:45:09 -07:00
Kubernetes Prow Robot
0483ffde22
Merge pull request #3839 from matusf/fix/pdns-tls-on
Make TLS enabled by default for PowerDNS provider
2023-09-05 11:24:51 -07:00
Michel Loiseleur
f04e72e15c review 2023-08-30 09:07:44 +02:00
Michel Loiseleur
955f755508 fix: discard unwanted logs 2023-08-25 12:27:57 +02:00
Predrag Janosevic
7ddc9daba7
exoscale provider: migrate to exoscale API v2 (#2917)
* exoscale provider: migrate to exoscale API v2

* exoscale: fix comment typo

* exoscale: remove debug line from test

* exoscale: replace endpoint config with environment

* exoscale: update Config

* Update pkg/apis/externaldns/types.go

Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>

* exoscale: document api zone & environment flags

* exoscale: update tutorial

* Sync deps with master

---------

Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>
2023-08-14 07:57:21 -07:00
Matúš Ferech
721c4e2110
Make TLS enabled by default for PowerDNS provider
All of the providers have TLS enabled by default so this change will
make PDNS provider behave as exected. Additionally, enabling TLS
by default is a good practice and previous bahaviour was a bit
misleading. It was possible to pass `--tls-ca` without
`--pdns-tls-enabled` and the PDNS provider would ignore the tls and
instantiate client with disabled tls. This change adds a flag to disable
the tls: `--pdns-skip-tls-verify`. Similar flag is used by pihole and
bluecat providers.

Additionaly this change makes providing custom TLS CA optional. It if is
not provided. A system certificates will be used. This makes PDNS behave
the same as other providers.
2023-08-14 11:06:43 +02:00
John Gardiner Myers
ef8b223b8e Migrate metadata from TXT to DynamoDB registries 2023-08-11 12:16:36 -07:00
Megum1n
70a43a4231
Merge branch 'master' into gloo-multiple-namespaces 2023-07-08 22:49:13 +02:00
John Gardiner Myers
4a40346d42 Remove flags and documentation for removed contour-ingressroute source 2023-07-04 16:37:37 -07:00
Megum1n
41d3de5364
Merge branch 'master' into gloo-multiple-namespaces 2023-06-24 02:11:35 +02:00
John Gardiner Myers
1a4c7b5f3c Support DynamoDB tables in other regions 2023-06-18 16:50:02 -07:00
John Gardiner Myers
5aae0af68a Add DynamoDB registry implementation 2023-06-18 16:49:58 -07:00
John Gardiner Myers
794a10dfbe Use common code for creating AWS sessions 2023-06-18 16:47:37 -07:00
Kubernetes Prow Robot
f56e2f6198
Merge pull request #1828 from vsychov/txt-encryption
Try #3: Support encrypted DNS txt records
2023-05-09 10:47:57 -07:00
Megum1n
028656d649
Change variable type and description 2023-05-08 12:08:00 +02:00
Arnaud Lefray
56773c0430
chore: merge with master 2023-05-04 15:23:10 +02:00
Viacheslav Sychov
2554f9f879 #1828: Support encrypted DNS txt records
Signed-off-by: Viacheslav Sychov <viacheslav.sychov@gmail.com>
2023-04-28 20:29:54 +02:00
Charles Xu
5e6f1a8b16 rename option to 'resolveServiceLoadBalancerHostname' 2023-04-23 16:25:13 -07:00
Charles Xu
1d232c4b86 feat: resolve LB-type Service hostname to create A/AAAA instead of CNAME 2023-04-18 21:10:56 -07:00
Kubernetes Prow Robot
e6ec8ea329
Merge pull request #2220 from ericrrath/crd-source-event-handler
CRD source: add event-handler support
2023-04-13 23:20:39 -07:00
megum1n
ac605fa4ce
Rename gloo-namespace flag back to singular word 2023-04-13 23:00:26 +02:00
Kubernetes Prow Robot
e7749e94d7
Merge pull request #1701 from ericrrath/oci-auth-instance-principal
OCI provider: add support for instance principal authentication
2023-04-11 06:43:06 -07:00
megum1n
3d48d66c91
Add support for multiple gloo namespaces in one External DNS instance 2023-03-15 02:33:00 +01:00
Kubernetes Prow Robot
b3a7698554
Merge pull request #3364 from arturhoo/cloudflare-paginated-list-requests
cloudflare - customizable pagination when listing DNS records
2023-03-02 07:30:55 -08:00
Eric R. Rath
929e618935 --events controls CRD informer creation
mgruener suggested that the --events flag could be wired to control whether or
not the CRD source created and started its informer.  This commit makes that
change; good idea!
2023-02-27 12:34:16 -08:00
Artur Rodrigues
789190d565
Parametize cloudflare dns records per page
Signed-off-by: Artur Rodrigues <artur.rodrigues@lacework.net>
2023-02-17 13:21:11 +00:00
Artur Rodrigues
81068bc1ce
Remove unused cloudflare pagination options
Signed-off-by: Artur Rodrigues <artur.rodrigues@lacework.net>
2023-02-17 13:21:10 +00:00
Craig Post
fabc588750
Added name~ regex match to infoblox with --infoblox-name-regex argument 2023-02-10 13:29:53 -07:00
Andrea Florio
126921667c
Merge branch 'kubernetes-sigs:master' into master 2022-11-07 14:11:21 +01:00
Andrea Florio
b550b7993c
added pi-hole section 2022-10-31 23:05:14 +01:00
Andy Bursavich
f6392be41e
gofumpt 2022-09-22 10:44:50 +01:00
DavidSpek
12f46d1e01
Implement plural provider
add plural to provider enum

go mod tidy

remove gitlab-ci

Signed-off-by: DavidSpek <vanderspek.david@gmail.com>

cleanup

Signed-off-by: DavidSpek <vanderspek.david@gmail.com>
2022-09-22 10:39:52 +01:00
misakazhou
3fa1b3c141
add the provider for the tencent cloud.
Signed-off-by: misakazhou <misakazhou@tencent.com>
2022-09-22 10:38:56 +01:00
Nathan J Mehl
7b9473c1cb
Set logformat before logging config
Google Cloud Logging (AKA Stackdriver Logs) interprets the default
logrus log format as "error" severity even when `level=info` is
present in the log output: ensure that the normal startup log
is not parsed as an error by setting the JSON formatter first.

Signed-off-by: Nathan J Mehl <n@oden.io>
2022-09-22 10:35:55 +01:00
Andy Bursavich
74ffff6c26 gofumpt 2022-09-20 20:48:57 -07:00
DavidSpek
62848b5a85 Implement plural provider
add plural to provider enum

go mod tidy

remove gitlab-ci

Signed-off-by: DavidSpek <vanderspek.david@gmail.com>

cleanup

Signed-off-by: DavidSpek <vanderspek.david@gmail.com>
2022-09-15 14:48:22 +02:00
misakazhou
a2e7ffc36a add the provider for the tencent cloud.
Signed-off-by: misakazhou <misakazhou@tencent.com>
2022-09-15 16:42:39 +08:00
Kubernetes Prow Robot
648c0dcee5
Merge pull request #2847 from odenio/master
Set logformat before logging config
2022-09-15 00:55:22 -07:00
Alejandro J. Nuñez Madrazo
d844ab115b
Merge branch 'master' of https://github.com/kubernetes-sigs/external-dns into kubernetes-sigs-master 2022-08-20 20:13:18 +01:00
Kubernetes Prow Robot
1f0f004d33
Merge pull request #2818 from PG2000/master
support ExternalID in AWS Provider when assuming a role
2022-08-19 08:41:52 -07:00
Kubernetes Prow Robot
e2b86a1146
Merge pull request #2693 from tobikris/add-target-net-filter
add target filters based on network
2022-08-02 01:38:15 -07:00
Andrey Lebedev
50f196c0db Handle the migration to the new TXT format: create missing records 2022-07-13 21:49:27 +02:00
Alejandro J. Nuñez Madrazo
82cba5a603
Merge branch 'master' of https://github.com/kubernetes-sigs/external-dns into kubernetes-sigs-master
Signed-off-by: Alejandro J. Nuñez Madrazo <alejandro@civo.com>
2022-06-30 23:43:37 +01:00
pg2000
3c5b1f96d3
replace Id with ID
Co-authored-by: Steven E. Harris <seh@panix.com>
2022-06-27 20:55:40 +02:00
pg2000
a05e5020c4
replace Id with ID
Co-authored-by: Steven E. Harris <seh@panix.com>
2022-06-27 20:55:00 +02:00
Nathan J Mehl
59ae8a88f5 Set logformat before logging config
Google Cloud Logging (AKA Stackdriver Logs) interprets the default
logrus log format as "error" severity even when `level=info` is
present in the log output: ensure that the normal startup log
is not parsed as an error by setting the JSON formatter first.

Signed-off-by: Nathan J Mehl <n@oden.io>
2022-06-26 13:05:38 -04:00
pg2000
4ace07f0a2
support ExternalID in AWS Provider when assuming a role 2022-06-15 18:49:31 +02:00
Kubernetes Prow Robot
de1db79bad
Merge pull request #2707 from hughhuangzh/add_ibmcloud_provider
Add IBM Cloud provider
2022-05-26 01:39:23 -07:00
Kubernetes Prow Robot
66e0d8c7fe
Merge pull request #2292 from abursavich/gateway-redo
Add Support for Gateway API Route Sources
2022-05-25 01:20:44 -07:00
Sergey Kudriavtsev
1423e0466f fixing Infoblox provider issue with constantly deleting/creating records when there is not changes in K8s 2022-05-13 15:18:45 +03:00
hzhihui
4703c11741 Add IBM Cloud provider 2022-04-14 11:53:16 +08:00
Vinny Sabatini
cbe1969511 provider/bluecat: fix txt pre/suffix bug
The prefix and suffix for the txt record was not being taken into
account when trying to find an owner for a cname and host record.

In addition, CName records have to be unique values, therefore txt records need to
have either a prefix or suffix included. This fixes the "owner" logic to
ensure when checking a corresponding txt recod against a cname record
that the prefix or suffix is used when comparing records.

Also, correct the response codes for the DELETE calls to Bluecat Gateway
2022-04-08 17:00:58 -05:00
Tobias Krischer
692f2bbc23
add target filters based on network 2022-04-08 19:29:58 +02:00
Rafal Korepta
9b27e6aeda
Revert hetzner plugin 2022-04-04 15:24:49 +01:00
Rafal Korepta
4f6ab703c1 Revert hetzner plugin 2022-03-09 22:20:14 +01:00
Alejandro J. Nuñez Madrazo
f735849157
Initial commit for the civo provider
Signed-off-by: Alejandro J. Nuñez Madrazo <alejandro@civo.com>
2022-02-26 12:55:27 +00:00
Andy Bursavich
3a1d86be20 gateway-httproute: add source 2022-02-24 21:30:10 -08:00
Dave Salisbury
1ceec80ec5 Merge remote-tracking branch 'origin/master' into ingress-class-filtering 2022-02-14 16:36:26 +11:00
Kubernetes Prow Robot
06405ed29c
Merge pull request #2510 from voro015/aws-sd-delete-empty-services
AWSSD: Cleanup empty Services
2022-02-12 04:39:46 -08:00
Vinny Sabatini
8aef3e089f provider/bluecat: add full deploy functionality
New configuration options created for setting the DNS deployment type,
as well as the DNS server to deploy. A DNS server name must be provided
and a valid DNS deployment type must be set in order for a deployment to be
initiated.

Currently, the only supported deployment type is "full deploy", however
"quick deploy" and "selective deploy" could be added in the future.
2022-02-11 16:12:45 -06:00
Sean Malloy
6521557f62 New bluecat provider CLI options 2022-01-28 14:24:26 -06:00
Andrey Lebedev
4f41229820 Pass stop channel to informer factory instances 2022-01-22 21:31:29 +01:00
Artem Voronin
8c951e8a76 Merge branch 'master' into aws-sd-delete-empty-services 2022-01-09 14:28:02 -08:00
Kubernetes Prow Robot
c8ef36567c
Merge pull request #2359 from assureddt/rjh_safedns_provider
Create SafeDNS provider
2022-01-05 12:31:49 -08:00
Rick Henry
a106313f55
First-pass implementation of SafeDNS provider 2022-01-05 09:22:01 +00:00
Rick Henry
d3ef1cd39f
Create package for SafeDNS 2022-01-05 09:22:01 +00:00
dbxbbm
a15f7807be [Infoblox] Disable permenant changes by disabling TTL 2022-01-02 15:58:31 +01:00
Dave Salisbury
097df5c458 Merge remote-tracking branch 'origin/master' into ingress-class-filtering 2021-12-28 14:27:30 +11:00
Eric R. Rath
02b7ffa324 Merge branch 'master' into oci-auth-instance-principal 2021-12-06 16:59:34 -08:00
Artem Voronin
7a0601c8b4 AWSSD Remove Empty Service 2021-11-14 17:43:35 -08:00
Miheer Salunke
ab8a62045e In OCP when you have multiple ingress controllers the route's status Ingress object get populated with multiple router canonical names. So in this case, the external dns tries to add multiple CNAME records for same host in the same hosted zone which is a violation of RFC 1912  and therefore is rejected by standards-compliant DNS services.
This feature adds a router field to the OCP Route Source so that a user can add an ingress controller name in flag --ocp-router-name which will be used to pick up the respective routerCanonicalHostname from Route's Status Ingress Object.

Signed-off-by: Miheer Salunke <miheer.salunke@gmail.com>
2021-11-03 12:52:57 +10:00
Dave Salisbury
b8cbd4bbf4 Merge remote-tracking branch 'origin/master' into ingress-class-filtering 2021-10-25 11:18:56 +11:00
Kubernetes Prow Robot
3756f60c47
Merge pull request #2258 from sagor999/ptr-support
Infoblox: add PTR record support
2021-10-20 01:13:58 -07:00
Arjun Naik
d91b7e6b8f Label filtering for Ingress, Service, Openshift Route sources
Currently the `--label-filter` flag can only be used to filter CRDs
which match the label selector passed through that flag. This change
extends the functionality to the Ingress, Service and Openshift Route
type objects. When the flag is not specified the default value is
`labels.Everything()` which is an empty string, the same as before.
Annotation based filter is inefficient because the filtering has to be
done in the controller instead of the API server like with label
filtering.
2021-10-14 11:06:55 +02:00
Dave Salisbury
8da6f99857 Rename ingressClassNameFilter to ingressClassNames
...and update the help text to specify use more clearly
2021-10-02 15:22:01 +10:00
Dave Salisbury
c4898b7e98 Plumb in filtering on ingress class name 2021-10-02 14:29:34 +10:00
Christian Groschupp
f9145981c3
infoblox: also create a ptr entry 2021-09-30 15:42:14 -07:00
Kubernetes Prow Robot
ec54ea73cb
Merge pull request #2153 from RentTheRunway/falconertc/clouddns_visibility_filter
CloudDNS: Allow filtering for private and public zones
2021-07-28 01:23:36 -07:00
Eric R. Rath
ce2ccebb2e Merge branch 'master' into oci-auth-instance-principal 2021-07-26 09:49:41 -07:00
Kubernetes Prow Robot
0a49e61268
Merge pull request #2091 from anandkumarpatel/feature/ignore-ingress-rules
Feature/ignore ingress rules
2021-07-14 00:40:28 -07:00
Kubernetes Prow Robot
ababc7bc63
Merge pull request #2127 from knackworks/rfc2136-batch-size
rfc2136: add batch size support
2021-07-03 10:58:18 -07:00
Falcon Taylor-Carter
436b9c3cf1 Add support for GoogleZoneVisibility 2021-07-01 19:21:39 -04:00
Anand Patel
509a07c493
create new source ingress config option IgnoreIngressRulesSpec 2021-06-30 10:03:04 -07:00
Aron Parsons
3c7813088a
rfc2136: add batch size support
Signed-off-by: Aron Parsons <aparsons@knackworks.com>
2021-06-30 07:24:12 -04:00
Kubernetes Prow Robot
d29b4316e2
Merge pull request #2089 from bbl/master
Add the --default-targets flag
2021-06-23 01:22:10 -07:00
Kubernetes Prow Robot
43ce441e08
Merge pull request #2110 from mmerrill3/feature/infoblox-reg-ex
Adding ability to query Infoblox API using regex for fqdn (#2102)
2021-06-23 01:04:10 -07:00