Kubernetes Prow Robot
0ba14d8873
Merge pull request #3973 from c445/roehrijn/aws-profiles
...
feat(aws): use AWS profiles using .credentials file
2024-06-10 13:59:23 -07:00
Michel Loiseleur
84da6be1dd
chore: Remove infoblox in-tree provider
2024-05-29 16:01:45 +02:00
Raffaele Di Fazio
1bfeb0810e
drops experimental notice in webhook flags
...
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
2024-05-27 18:15:01 +02:00
Jeremy-Boyle
fe0af65a14
Removed the env, and moved to config file changes for ADD endpoints, need to update docs next
2024-04-16 09:58:31 -07:00
angeloxx
cd2088dff3
Merged from master and tested.
2024-03-19 13:27:17 +01:00
Jan Roehrich
7fb25f44ce
Allow usage of (multiple) AWS profiles using .credentials file
2024-03-05 23:06:16 +01:00
Kubernetes Prow Robot
8d3eb3a3ff
Merge pull request #3974 from iteratee/rfc2136-dns-over-tls
...
RFC2136: Add support for DNS-over-TLS
2024-02-29 10:00:41 -08:00
angeloxx
bab7a84f11
Fix test coverage
2024-02-26 22:15:46 +01:00
Kyle Butt
a3c9908d5e
RFC2136: Add support for DNS-over-TLS
...
* Reuse the existing TLS options.
* Add two new flags, one to enable DNS-over-TLS, and the second to
disable cert checks for DNS-over-TLS.
* Factor out the connection code so that it can be shared between the
zone transfer and the updates. If TLS was requested, it will be used
for both.
* RFC9013 requires TLS 1.3 or later, and an ALPN negotiation of "dot".
2024-02-26 11:23:34 -07:00
angeloxx
b083e34dfb
Rename option with --rfc2136-create-ptr, similar to infoblox option
2024-02-25 18:50:35 +01:00
angeloxx
940899b758
Add command line parameter and update helm
2024-02-25 18:40:12 +01:00
Kubernetes Prow Robot
52460ba89c
Merge pull request #4186 from pascalgn/azure-subscription-id-override
...
feat: enable Azure subscription ID override
2024-02-15 06:00:13 -08:00
Pascal
be7cac2a56
feat: enable Azure subscription ID override
2024-02-09 12:17:44 +01:00
Megum1n
7d3d355175
Merge branch 'master' into aws-provider-validate-value-size
2024-02-07 16:27:36 +01:00
thiagoluiznunes
4660134170
test(types): adding missing test to aws-zone-match-parent flag
2024-02-06 10:39:45 -03:00
thiagoluiznunes
70835ab7bd
feat(aws-provider): create flag to support sub-domains match parent
...
The current implementation of external-dns from sig-external-dns does
not support domain filtering (--domain-filter) for sub-domains on Route53,
such as test.sub-domain.domain.com. The function MatchParent was recently
removed from the base code, but it is still necessary for this purpose.
An example of a use case for this support is having a cluster per hosted
zone with a hundred ingress related to that zone with different variants of
sub-domains. With the matchParent function and zone-match-parent flag,
external-dns will now support an extended automatic match for sub-domains.
2024-02-06 10:33:01 -03:00
Megum1n
c391f5588a
Validate AWS record values size during batch set generation
2023-12-19 10:21:47 +01:00
Kristopher Kirkland
9015377c12
Add flags to disable each of the Traefik API groups
2023-11-29 12:14:59 -06:00
Anders Swanson
dbaca73de2
oracle provider: dns zone cache
...
Signed-off-by: Anders Swanson <anders.swanson@oracle.com>
2023-11-14 12:59:45 -08:00
Manuel Rüger
2a9196fa69
chore: Bump kingpin/v2 dep
2023-11-10 16:49:46 +01:00
Kubernetes Prow Robot
0c8002b191
Merge pull request #3976 from CRASH-Tech/master
...
RFC2136: Allow multiple zones
2023-11-10 09:15:19 +01:00
Anders Swanson
4eb71536e1
OCI Provider private zone and workload identity support
2023-10-17 10:55:11 -07:00
Kubernetes Prow Robot
0725104c9e
Merge pull request #3962 from johngmyers/remove-testing
...
Remove the --run-aws-provider-as-webhook flag
2023-10-09 02:32:47 +02:00
s.kharlamov
4794c01c6f
Allow multiple RFC2136 zones
2023-10-08 22:48:48 +00:00
Tobias Bradtke
fb8b294e2c
Add missing closing parentheses
2023-10-02 13:58:30 +02:00
John Gardiner Myers
627f9b1a00
Remove the --run-aws-provider-as-webhook flag
2023-09-27 23:21:33 -07:00
John Gardiner Myers
859892fc72
Add --webhook-server flag for running as a webhook server ( #3957 )
...
* Add --webhook-server flag for running as a webhook server
* Address review comment
2023-09-27 07:40:09 -07:00
Kubernetes Prow Robot
f0b6260012
Merge pull request #3940 from johngmyers/node-filter
...
Support --label-filter for node source
2023-09-26 16:55:44 -07:00
Raffaele Di Fazio
8251b6dd85
Webhook provider ( #3063 )
...
* initial plugin implementation
* rename to webhook
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* json encoder changes
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* addressing review comments
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* changes according to ionos review
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* fix to accomodate changes in master
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* fixes to accomodate master changes
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* remove all propertyvaluesequals leftovers
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* readd negotiation to pass the domain filter around
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* fix domain filter passing
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* webhook fixes
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* fix tests
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* fix docs
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* docs fixes
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* code review comments on json unmarshal
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* handle error in adjustendpoints
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* fix a bunch of wrong require
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* tests and docs
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* fix typo
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
---------
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
2023-09-25 01:14:58 -07:00
John Gardiner Myers
75639b759c
Support --label-filter for node source
2023-09-20 08:56:26 -07:00
Kubernetes Prow Robot
e0405a2e60
Merge pull request #3748 from johngmyers/exclude-managed
...
Add --exclude-record-types flag
2023-09-18 22:37:49 -07:00
Kubernetes Prow Robot
d54fa589c2
Merge pull request #3480 from Megum1n/gloo-multiple-namespaces
...
Add support for multiple gloo namespaces in one External DNS instance
2023-09-15 22:10:13 -07:00
John Gardiner Myers
94713c20c6
Add --exclude-record-types flag
2023-09-15 18:45:09 -07:00
Kubernetes Prow Robot
0483ffde22
Merge pull request #3839 from matusf/fix/pdns-tls-on
...
Make TLS enabled by default for PowerDNS provider
2023-09-05 11:24:51 -07:00
Kubernetes Prow Robot
6a53959385
Merge pull request #3806 from johngmyers/doc-sources
...
Document the Ingress source
2023-09-04 01:03:48 -07:00
Predrag Janosevic
7ddc9daba7
exoscale provider: migrate to exoscale API v2 ( #2917 )
...
* exoscale provider: migrate to exoscale API v2
* exoscale: fix comment typo
* exoscale: remove debug line from test
* exoscale: replace endpoint config with environment
* exoscale: update Config
* Update pkg/apis/externaldns/types.go
Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>
* exoscale: document api zone & environment flags
* exoscale: update tutorial
* Sync deps with master
---------
Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>
2023-08-14 07:57:21 -07:00
Matúš Ferech
721c4e2110
Make TLS enabled by default for PowerDNS provider
...
All of the providers have TLS enabled by default so this change will
make PDNS provider behave as exected. Additionally, enabling TLS
by default is a good practice and previous bahaviour was a bit
misleading. It was possible to pass `--tls-ca` without
`--pdns-tls-enabled` and the PDNS provider would ignore the tls and
instantiate client with disabled tls. This change adds a flag to disable
the tls: `--pdns-skip-tls-verify`. Similar flag is used by pihole and
bluecat providers.
Additionaly this change makes providing custom TLS CA optional. It if is
not provided. A system certificates will be used. This makes PDNS behave
the same as other providers.
2023-08-14 11:06:43 +02:00
John Gardiner Myers
0eb91e358d
Document the Ingress source
2023-08-04 04:06:02 -07:00
Hans Kristian Nordengen
012fc88030
Tagget parameter TXTEncryptAESKey as secure
2023-07-17 19:54:07 +02:00
Megum1n
dc261a8793
Typo after merge from master
2023-07-08 22:56:19 +02:00
Megum1n
70a43a4231
Merge branch 'master' into gloo-multiple-namespaces
2023-07-08 22:49:13 +02:00
John Gardiner Myers
4a40346d42
Remove flags and documentation for removed contour-ingressroute source
2023-07-04 16:37:37 -07:00
Christian Groschupp
fd8c42732d
support cnames and aaaa for default-targets
2023-06-29 16:06:02 +02:00
Megum1n
30e34f8ae3
Update pkg/apis/externaldns/types.go
...
Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>
2023-06-26 12:23:24 +02:00
Megum1n
41d3de5364
Merge branch 'master' into gloo-multiple-namespaces
2023-06-24 02:11:35 +02:00
John Gardiner Myers
1a4c7b5f3c
Support DynamoDB tables in other regions
2023-06-18 16:50:02 -07:00
John Gardiner Myers
5aae0af68a
Add DynamoDB registry implementation
2023-06-18 16:49:58 -07:00
John Gardiner Myers
794a10dfbe
Use common code for creating AWS sessions
2023-06-18 16:47:37 -07:00
Thomas Kosiewski
23326bd4bf
Added traefik-proxy to source docs string
...
Signed-off-by: Thomas Kosiewski <thoma471@googlemail.com>
2023-06-02 12:47:34 +02:00
Thomas Kosiewski
95abe994c4
Merge remote-tracking branch 'kubernetes-sigs/master'
2023-06-01 18:49:38 +02:00
Kubernetes Prow Robot
f56e2f6198
Merge pull request #1828 from vsychov/txt-encryption
...
Try #3 : Support encrypted DNS txt records
2023-05-09 10:47:57 -07:00
Megum1n
028656d649
Change variable type and description
2023-05-08 12:08:00 +02:00
Arnaud Lefray
56773c0430
chore: merge with master
2023-05-04 15:23:10 +02:00
Viacheslav Sychov
2554f9f879
#1828 : Support encrypted DNS txt records
...
Signed-off-by: Viacheslav Sychov <viacheslav.sychov@gmail.com>
2023-04-28 20:29:54 +02:00
Charles Xu
5e6f1a8b16
rename option to 'resolveServiceLoadBalancerHostname'
2023-04-23 16:25:13 -07:00
Charles Xu
1d232c4b86
feat: resolve LB-type Service hostname to create A/AAAA instead of CNAME
2023-04-18 21:10:56 -07:00
Kubernetes Prow Robot
e48ec6b241
Merge pull request #2461 from johngmyers/quad-a
...
Add support for AAAA records
2023-04-13 14:26:42 -07:00
megum1n
ac605fa4ce
Rename gloo-namespace flag back to singular word
2023-04-13 23:00:26 +02:00
Kubernetes Prow Robot
e7749e94d7
Merge pull request #1701 from ericrrath/oci-auth-instance-principal
...
OCI provider: add support for instance principal authentication
2023-04-11 06:43:06 -07:00
John Gardiner Myers
de1db3f03d
Unit test fixes
2023-03-30 17:49:31 -07:00
Skyler Mäntysaari
6f42a8a2da
Initial IPv6 support
2023-03-30 17:49:28 -07:00
Sewci0
815ff2a6d9
Fix cli docs
2023-03-29 14:00:24 +01:00
Thomas Kosiewski
458b702762
Added traefik source
2023-03-17 15:15:41 +01:00
megum1n
3d48d66c91
Add support for multiple gloo namespaces in one External DNS instance
2023-03-15 02:33:00 +01:00
Mikael Johansson
9a76be0202
Add F5 VirtualServer source
2023-03-14 10:23:56 +01:00
Kubernetes Prow Robot
b3a7698554
Merge pull request #3364 from arturhoo/cloudflare-paginated-list-requests
...
cloudflare - customizable pagination when listing DNS records
2023-03-02 07:30:55 -08:00
Artur Rodrigues
789190d565
Parametize cloudflare dns records per page
...
Signed-off-by: Artur Rodrigues <artur.rodrigues@lacework.net>
2023-02-17 13:21:11 +00:00
Artur Rodrigues
81068bc1ce
Remove unused cloudflare pagination options
...
Signed-off-by: Artur Rodrigues <artur.rodrigues@lacework.net>
2023-02-17 13:21:10 +00:00
Craig Post
fabc588750
Added name~ regex match to infoblox with --infoblox-name-regex argument
2023-02-10 13:29:53 -07:00
Andy Bursavich
13d978caeb
gateway-api: upgrade from v0.5.1 to v0.6.0 and add GRPCRoute support
2023-01-04 08:18:35 -08:00
Jonas Badstübner
0ef72c7eb9
[flags/provider] handle providers DRY-style
2022-12-14 10:21:25 +01:00
Jonas Badstübner
240aaaec02
[flags/provider] add gone providers
2022-12-14 10:14:47 +01:00
Jonas Badstübner
b2afcdd854
[flags/provider] add civo; order alphabetically
2022-12-14 10:05:19 +01:00
Sergiusz Urbaniak
d81aeb3194
pkg/apis/externaldns/types.go: add civo
2022-11-20 20:22:43 +01:00
Andrea Florio
cc2c3878c4
use gofmt to fix lint issues
2022-11-07 13:35:16 +00:00
Andrea Florio
b5dc865e11
completed pi-hole
2022-10-31 23:07:44 +01:00
Andy Bursavich
74ffff6c26
gofumpt
2022-09-20 20:48:57 -07:00
Lukasz Zajaczkowski
0b2d3ed109
rebase
2022-09-15 14:59:36 +02:00
DavidSpek
62848b5a85
Implement plural provider
...
add plural to provider enum
go mod tidy
remove gitlab-ci
Signed-off-by: DavidSpek <vanderspek.david@gmail.com>
cleanup
Signed-off-by: DavidSpek <vanderspek.david@gmail.com>
2022-09-15 14:48:22 +02:00
misakazhou
a2e7ffc36a
add the provider for the tencent cloud.
...
Signed-off-by: misakazhou <misakazhou@tencent.com>
2022-09-15 16:42:39 +08:00
Kubernetes Prow Robot
1f0f004d33
Merge pull request #2818 from PG2000/master
...
support ExternalID in AWS Provider when assuming a role
2022-08-19 08:41:52 -07:00
pg2000
03a28eea6e
Update pkg/apis/externaldns/types.go
...
Co-authored-by: Nick Jüttner <nick@juni.io>
2022-08-19 16:50:17 +02:00
Kubernetes Prow Robot
e2b86a1146
Merge pull request #2693 from tobikris/add-target-net-filter
...
add target filters based on network
2022-08-02 01:38:15 -07:00
pg2000
52c8edebab
replace Id with ID
...
Co-authored-by: Steven E. Harris <seh@panix.com>
2022-06-27 20:56:39 +02:00
pg2000
ff56bf8090
replace Id with ID
...
Co-authored-by: Steven E. Harris <seh@panix.com>
2022-06-27 20:56:29 +02:00
pg2000
fd68732cd5
replace Id with ID
...
Co-authored-by: Steven E. Harris <seh@panix.com>
2022-06-27 20:56:21 +02:00
pg2000
026e15b1aa
replace Id with ID
...
Co-authored-by: Steven E. Harris <seh@panix.com>
2022-06-27 20:56:07 +02:00
pg2000
d327ff7f6d
replace Id with ID
...
Co-authored-by: Steven E. Harris <seh@panix.com>
2022-06-27 20:55:47 +02:00
pg2000
4ace07f0a2
support ExternalID in AWS Provider when assuming a role
2022-06-15 18:49:31 +02:00
Kubernetes Prow Robot
de1db79bad
Merge pull request #2707 from hughhuangzh/add_ibmcloud_provider
...
Add IBM Cloud provider
2022-05-26 01:39:23 -07:00
Kubernetes Prow Robot
66e0d8c7fe
Merge pull request #2292 from abursavich/gateway-redo
...
Add Support for Gateway API Route Sources
2022-05-25 01:20:44 -07:00
hzhihui
57aa72f279
Merge branch 'master' into add_ibmcloud_provider
2022-04-20 09:00:16 +08:00
Kubernetes Prow Robot
01e8a2c269
Merge pull request #2703 from scottd018/feat-restrict-rfc2136-sensitive-values
...
feat: restrict rfc2136 kerberos password from being exposed in logs
2022-04-19 01:39:17 -07:00
Dinar Valeev
25c7cb28ea
Add additional txt record with record type marker
...
In order to track multiple record types with the same name, lets migrate
to new format, were record name contains record type in it.
Signed-off-by: Dinar Valeev <dinar.valeev@absa.africa>
2022-04-14 16:39:36 +02:00
hzhihui
4703c11741
Add IBM Cloud provider
2022-04-14 11:53:16 +08:00
Dustin Scott
d035ecce71
feat: restrict rfc2136 kerberos password from being exposed in logs
...
Signed-off-by: Dustin Scott <sdustin@vmware.com>
2022-04-11 10:19:41 -05:00
Tobias Krischer
692f2bbc23
add target filters based on network
2022-04-08 19:29:58 +02:00
Rafal Korepta
4f6ab703c1
Revert hetzner plugin
2022-03-09 22:20:14 +01:00
Andy Bursavich
71e45ce1d3
gateway-udproute: add source
2022-02-24 21:30:10 -08:00
Andy Bursavich
52e3fd61db
gateway-tcproute: add source
2022-02-24 21:30:10 -08:00