Commit Graph

327 Commits

Author SHA1 Message Date
Manuel Rüger
28c3153826 webhook: Move httpapi into own package
Signed-off-by: Manuel Rüger <manuel@rueg.eu>
2023-11-30 21:59:00 +01:00
Anders Swanson
dbaca73de2 oracle provider: dns zone cache
Signed-off-by: Anders Swanson <anders.swanson@oracle.com>
2023-11-14 12:59:45 -08:00
Anders Swanson
4eb71536e1 OCI Provider private zone and workload identity support 2023-10-17 10:55:11 -07:00
John Gardiner Myers
627f9b1a00 Remove the --run-aws-provider-as-webhook flag 2023-09-27 23:21:33 -07:00
John Gardiner Myers
859892fc72
Add --webhook-server flag for running as a webhook server (#3957)
* Add --webhook-server flag for running as a webhook server

* Address review comment
2023-09-27 07:40:09 -07:00
Raffaele Di Fazio
8251b6dd85
Webhook provider (#3063)
* initial plugin implementation

* rename to webhook

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* json encoder changes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* addressing review comments

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* changes according to ionos review

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix to accomodate changes in master

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fixes to accomodate master changes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* remove all propertyvaluesequals leftovers

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* readd negotiation to pass the domain filter around

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix domain filter passing

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* webhook fixes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix tests

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix docs

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* docs fixes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* code review comments on json unmarshal

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* handle error in adjustendpoints

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix a bunch of wrong require

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* tests and docs

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix typo

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

---------

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
2023-09-25 01:14:58 -07:00
Kubernetes Prow Robot
e0405a2e60
Merge pull request #3748 from johngmyers/exclude-managed
Add --exclude-record-types flag
2023-09-18 22:37:49 -07:00
Kubernetes Prow Robot
d54fa589c2
Merge pull request #3480 from Megum1n/gloo-multiple-namespaces
Add support for multiple gloo namespaces in one External DNS instance
2023-09-15 22:10:13 -07:00
John Gardiner Myers
94713c20c6 Add --exclude-record-types flag 2023-09-15 18:45:09 -07:00
Kubernetes Prow Robot
0483ffde22
Merge pull request #3839 from matusf/fix/pdns-tls-on
Make TLS enabled by default for PowerDNS provider
2023-09-05 11:24:51 -07:00
Michel Loiseleur
f04e72e15c review 2023-08-30 09:07:44 +02:00
Michel Loiseleur
955f755508 fix: discard unwanted logs 2023-08-25 12:27:57 +02:00
Predrag Janosevic
7ddc9daba7
exoscale provider: migrate to exoscale API v2 (#2917)
* exoscale provider: migrate to exoscale API v2

* exoscale: fix comment typo

* exoscale: remove debug line from test

* exoscale: replace endpoint config with environment

* exoscale: update Config

* Update pkg/apis/externaldns/types.go

Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>

* exoscale: document api zone & environment flags

* exoscale: update tutorial

* Sync deps with master

---------

Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>
2023-08-14 07:57:21 -07:00
Matúš Ferech
721c4e2110
Make TLS enabled by default for PowerDNS provider
All of the providers have TLS enabled by default so this change will
make PDNS provider behave as exected. Additionally, enabling TLS
by default is a good practice and previous bahaviour was a bit
misleading. It was possible to pass `--tls-ca` without
`--pdns-tls-enabled` and the PDNS provider would ignore the tls and
instantiate client with disabled tls. This change adds a flag to disable
the tls: `--pdns-skip-tls-verify`. Similar flag is used by pihole and
bluecat providers.

Additionaly this change makes providing custom TLS CA optional. It if is
not provided. A system certificates will be used. This makes PDNS behave
the same as other providers.
2023-08-14 11:06:43 +02:00
John Gardiner Myers
ef8b223b8e Migrate metadata from TXT to DynamoDB registries 2023-08-11 12:16:36 -07:00
Megum1n
70a43a4231
Merge branch 'master' into gloo-multiple-namespaces 2023-07-08 22:49:13 +02:00
John Gardiner Myers
4a40346d42 Remove flags and documentation for removed contour-ingressroute source 2023-07-04 16:37:37 -07:00
Megum1n
41d3de5364
Merge branch 'master' into gloo-multiple-namespaces 2023-06-24 02:11:35 +02:00
John Gardiner Myers
1a4c7b5f3c Support DynamoDB tables in other regions 2023-06-18 16:50:02 -07:00
John Gardiner Myers
5aae0af68a Add DynamoDB registry implementation 2023-06-18 16:49:58 -07:00
John Gardiner Myers
794a10dfbe Use common code for creating AWS sessions 2023-06-18 16:47:37 -07:00
Kubernetes Prow Robot
f56e2f6198
Merge pull request #1828 from vsychov/txt-encryption
Try #3: Support encrypted DNS txt records
2023-05-09 10:47:57 -07:00
Megum1n
028656d649
Change variable type and description 2023-05-08 12:08:00 +02:00
Arnaud Lefray
56773c0430
chore: merge with master 2023-05-04 15:23:10 +02:00
Viacheslav Sychov
2554f9f879 #1828: Support encrypted DNS txt records
Signed-off-by: Viacheslav Sychov <viacheslav.sychov@gmail.com>
2023-04-28 20:29:54 +02:00
Charles Xu
5e6f1a8b16 rename option to 'resolveServiceLoadBalancerHostname' 2023-04-23 16:25:13 -07:00
Charles Xu
1d232c4b86 feat: resolve LB-type Service hostname to create A/AAAA instead of CNAME 2023-04-18 21:10:56 -07:00
Kubernetes Prow Robot
e6ec8ea329
Merge pull request #2220 from ericrrath/crd-source-event-handler
CRD source: add event-handler support
2023-04-13 23:20:39 -07:00
megum1n
ac605fa4ce
Rename gloo-namespace flag back to singular word 2023-04-13 23:00:26 +02:00
Kubernetes Prow Robot
e7749e94d7
Merge pull request #1701 from ericrrath/oci-auth-instance-principal
OCI provider: add support for instance principal authentication
2023-04-11 06:43:06 -07:00
megum1n
3d48d66c91
Add support for multiple gloo namespaces in one External DNS instance 2023-03-15 02:33:00 +01:00
Kubernetes Prow Robot
b3a7698554
Merge pull request #3364 from arturhoo/cloudflare-paginated-list-requests
cloudflare - customizable pagination when listing DNS records
2023-03-02 07:30:55 -08:00
Eric R. Rath
929e618935 --events controls CRD informer creation
mgruener suggested that the --events flag could be wired to control whether or
not the CRD source created and started its informer.  This commit makes that
change; good idea!
2023-02-27 12:34:16 -08:00
Artur Rodrigues
789190d565
Parametize cloudflare dns records per page
Signed-off-by: Artur Rodrigues <artur.rodrigues@lacework.net>
2023-02-17 13:21:11 +00:00
Artur Rodrigues
81068bc1ce
Remove unused cloudflare pagination options
Signed-off-by: Artur Rodrigues <artur.rodrigues@lacework.net>
2023-02-17 13:21:10 +00:00
Craig Post
fabc588750
Added name~ regex match to infoblox with --infoblox-name-regex argument 2023-02-10 13:29:53 -07:00
Andrea Florio
126921667c
Merge branch 'kubernetes-sigs:master' into master 2022-11-07 14:11:21 +01:00
Andrea Florio
b550b7993c
added pi-hole section 2022-10-31 23:05:14 +01:00
Andy Bursavich
f6392be41e
gofumpt 2022-09-22 10:44:50 +01:00
DavidSpek
12f46d1e01
Implement plural provider
add plural to provider enum

go mod tidy

remove gitlab-ci

Signed-off-by: DavidSpek <vanderspek.david@gmail.com>

cleanup

Signed-off-by: DavidSpek <vanderspek.david@gmail.com>
2022-09-22 10:39:52 +01:00
misakazhou
3fa1b3c141
add the provider for the tencent cloud.
Signed-off-by: misakazhou <misakazhou@tencent.com>
2022-09-22 10:38:56 +01:00
Nathan J Mehl
7b9473c1cb
Set logformat before logging config
Google Cloud Logging (AKA Stackdriver Logs) interprets the default
logrus log format as "error" severity even when `level=info` is
present in the log output: ensure that the normal startup log
is not parsed as an error by setting the JSON formatter first.

Signed-off-by: Nathan J Mehl <n@oden.io>
2022-09-22 10:35:55 +01:00
Andy Bursavich
74ffff6c26 gofumpt 2022-09-20 20:48:57 -07:00
DavidSpek
62848b5a85 Implement plural provider
add plural to provider enum

go mod tidy

remove gitlab-ci

Signed-off-by: DavidSpek <vanderspek.david@gmail.com>

cleanup

Signed-off-by: DavidSpek <vanderspek.david@gmail.com>
2022-09-15 14:48:22 +02:00
misakazhou
a2e7ffc36a add the provider for the tencent cloud.
Signed-off-by: misakazhou <misakazhou@tencent.com>
2022-09-15 16:42:39 +08:00
Kubernetes Prow Robot
648c0dcee5
Merge pull request #2847 from odenio/master
Set logformat before logging config
2022-09-15 00:55:22 -07:00
Alejandro J. Nuñez Madrazo
d844ab115b
Merge branch 'master' of https://github.com/kubernetes-sigs/external-dns into kubernetes-sigs-master 2022-08-20 20:13:18 +01:00
Kubernetes Prow Robot
1f0f004d33
Merge pull request #2818 from PG2000/master
support ExternalID in AWS Provider when assuming a role
2022-08-19 08:41:52 -07:00
Kubernetes Prow Robot
e2b86a1146
Merge pull request #2693 from tobikris/add-target-net-filter
add target filters based on network
2022-08-02 01:38:15 -07:00
Andrey Lebedev
50f196c0db Handle the migration to the new TXT format: create missing records 2022-07-13 21:49:27 +02:00