Commit Graph

447 Commits

Author SHA1 Message Date
Kubernetes Prow Robot
0ba14d8873
Merge pull request #3973 from c445/roehrijn/aws-profiles
feat(aws): use AWS profiles using .credentials file
2024-06-10 13:59:23 -07:00
Michel Loiseleur
84da6be1dd chore: Remove infoblox in-tree provider 2024-05-29 16:01:45 +02:00
Raffaele Di Fazio
1bfeb0810e drops experimental notice in webhook flags
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
2024-05-27 18:15:01 +02:00
Jeremy-Boyle
fe0af65a14 Removed the env, and moved to config file changes for ADD endpoints, need to update docs next 2024-04-16 09:58:31 -07:00
angeloxx
cd2088dff3 Merged from master and tested. 2024-03-19 13:27:17 +01:00
Jan Roehrich
7fb25f44ce
Allow usage of (multiple) AWS profiles using .credentials file 2024-03-05 23:06:16 +01:00
Kubernetes Prow Robot
8d3eb3a3ff
Merge pull request #3974 from iteratee/rfc2136-dns-over-tls
RFC2136: Add support for DNS-over-TLS
2024-02-29 10:00:41 -08:00
angeloxx
bab7a84f11 Fix test coverage 2024-02-26 22:15:46 +01:00
Kyle Butt
a3c9908d5e
RFC2136: Add support for DNS-over-TLS
*  Reuse the existing TLS options.
 *  Add two new flags, one to enable DNS-over-TLS, and the second to
    disable cert checks for DNS-over-TLS.
 *  Factor out the connection code so that it can be shared between the
    zone transfer and the updates. If TLS was requested, it will be used
    for both.
 *  RFC9013 requires TLS 1.3 or later, and an ALPN negotiation of "dot".
2024-02-26 11:23:34 -07:00
angeloxx
b083e34dfb Rename option with --rfc2136-create-ptr, similar to infoblox option 2024-02-25 18:50:35 +01:00
angeloxx
940899b758 Add command line parameter and update helm 2024-02-25 18:40:12 +01:00
Kubernetes Prow Robot
52460ba89c
Merge pull request #4186 from pascalgn/azure-subscription-id-override
feat: enable Azure subscription ID override
2024-02-15 06:00:13 -08:00
Pascal
be7cac2a56 feat: enable Azure subscription ID override 2024-02-09 12:17:44 +01:00
Megum1n
7d3d355175
Merge branch 'master' into aws-provider-validate-value-size 2024-02-07 16:27:36 +01:00
thiagoluiznunes
4660134170 test(types): adding missing test to aws-zone-match-parent flag 2024-02-06 10:39:45 -03:00
thiagoluiznunes
70835ab7bd feat(aws-provider): create flag to support sub-domains match parent
The current implementation of external-dns from sig-external-dns does
not support domain filtering (--domain-filter) for sub-domains on Route53,
such as test.sub-domain.domain.com. The function MatchParent was recently
removed from the base code, but it is still necessary for this purpose.
An example of a use case for this support is having a cluster per hosted
zone with a hundred ingress related to that zone with different variants of
sub-domains. With the matchParent function and zone-match-parent flag,
external-dns will now support an extended automatic match for sub-domains.
2024-02-06 10:33:01 -03:00
Megum1n
c391f5588a
Validate AWS record values size during batch set generation 2023-12-19 10:21:47 +01:00
Kristopher Kirkland
9015377c12 Add flags to disable each of the Traefik API groups 2023-11-29 12:14:59 -06:00
Anders Swanson
dbaca73de2 oracle provider: dns zone cache
Signed-off-by: Anders Swanson <anders.swanson@oracle.com>
2023-11-14 12:59:45 -08:00
Manuel Rüger
2a9196fa69 chore: Bump kingpin/v2 dep 2023-11-10 16:49:46 +01:00
Kubernetes Prow Robot
0c8002b191
Merge pull request #3976 from CRASH-Tech/master
RFC2136: Allow multiple zones
2023-11-10 09:15:19 +01:00
Anders Swanson
4eb71536e1 OCI Provider private zone and workload identity support 2023-10-17 10:55:11 -07:00
Kubernetes Prow Robot
0725104c9e
Merge pull request #3962 from johngmyers/remove-testing
Remove the --run-aws-provider-as-webhook flag
2023-10-09 02:32:47 +02:00
s.kharlamov
4794c01c6f Allow multiple RFC2136 zones 2023-10-08 22:48:48 +00:00
Tobias Bradtke
fb8b294e2c Add missing closing parentheses 2023-10-02 13:58:30 +02:00
John Gardiner Myers
627f9b1a00 Remove the --run-aws-provider-as-webhook flag 2023-09-27 23:21:33 -07:00
John Gardiner Myers
859892fc72
Add --webhook-server flag for running as a webhook server (#3957)
* Add --webhook-server flag for running as a webhook server

* Address review comment
2023-09-27 07:40:09 -07:00
Kubernetes Prow Robot
f0b6260012
Merge pull request #3940 from johngmyers/node-filter
Support --label-filter for node source
2023-09-26 16:55:44 -07:00
Raffaele Di Fazio
8251b6dd85
Webhook provider (#3063)
* initial plugin implementation

* rename to webhook

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* json encoder changes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* addressing review comments

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* changes according to ionos review

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix to accomodate changes in master

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fixes to accomodate master changes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* remove all propertyvaluesequals leftovers

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* readd negotiation to pass the domain filter around

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix domain filter passing

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* webhook fixes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix tests

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix docs

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* docs fixes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* code review comments on json unmarshal

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* handle error in adjustendpoints

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix a bunch of wrong require

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* tests and docs

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix typo

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

---------

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
2023-09-25 01:14:58 -07:00
John Gardiner Myers
75639b759c Support --label-filter for node source 2023-09-20 08:56:26 -07:00
Kubernetes Prow Robot
e0405a2e60
Merge pull request #3748 from johngmyers/exclude-managed
Add --exclude-record-types flag
2023-09-18 22:37:49 -07:00
Kubernetes Prow Robot
d54fa589c2
Merge pull request #3480 from Megum1n/gloo-multiple-namespaces
Add support for multiple gloo namespaces in one External DNS instance
2023-09-15 22:10:13 -07:00
John Gardiner Myers
94713c20c6 Add --exclude-record-types flag 2023-09-15 18:45:09 -07:00
Kubernetes Prow Robot
0483ffde22
Merge pull request #3839 from matusf/fix/pdns-tls-on
Make TLS enabled by default for PowerDNS provider
2023-09-05 11:24:51 -07:00
Kubernetes Prow Robot
6a53959385
Merge pull request #3806 from johngmyers/doc-sources
Document the Ingress source
2023-09-04 01:03:48 -07:00
Predrag Janosevic
7ddc9daba7
exoscale provider: migrate to exoscale API v2 (#2917)
* exoscale provider: migrate to exoscale API v2

* exoscale: fix comment typo

* exoscale: remove debug line from test

* exoscale: replace endpoint config with environment

* exoscale: update Config

* Update pkg/apis/externaldns/types.go

Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>

* exoscale: document api zone & environment flags

* exoscale: update tutorial

* Sync deps with master

---------

Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>
2023-08-14 07:57:21 -07:00
Matúš Ferech
721c4e2110
Make TLS enabled by default for PowerDNS provider
All of the providers have TLS enabled by default so this change will
make PDNS provider behave as exected. Additionally, enabling TLS
by default is a good practice and previous bahaviour was a bit
misleading. It was possible to pass `--tls-ca` without
`--pdns-tls-enabled` and the PDNS provider would ignore the tls and
instantiate client with disabled tls. This change adds a flag to disable
the tls: `--pdns-skip-tls-verify`. Similar flag is used by pihole and
bluecat providers.

Additionaly this change makes providing custom TLS CA optional. It if is
not provided. A system certificates will be used. This makes PDNS behave
the same as other providers.
2023-08-14 11:06:43 +02:00
John Gardiner Myers
0eb91e358d Document the Ingress source 2023-08-04 04:06:02 -07:00
Hans Kristian Nordengen
012fc88030 Tagget parameter TXTEncryptAESKey as secure 2023-07-17 19:54:07 +02:00
Megum1n
dc261a8793
Typo after merge from master 2023-07-08 22:56:19 +02:00
Megum1n
70a43a4231
Merge branch 'master' into gloo-multiple-namespaces 2023-07-08 22:49:13 +02:00
John Gardiner Myers
4a40346d42 Remove flags and documentation for removed contour-ingressroute source 2023-07-04 16:37:37 -07:00
Christian Groschupp
fd8c42732d support cnames and aaaa for default-targets 2023-06-29 16:06:02 +02:00
Megum1n
30e34f8ae3
Update pkg/apis/externaldns/types.go
Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>
2023-06-26 12:23:24 +02:00
Megum1n
41d3de5364
Merge branch 'master' into gloo-multiple-namespaces 2023-06-24 02:11:35 +02:00
John Gardiner Myers
1a4c7b5f3c Support DynamoDB tables in other regions 2023-06-18 16:50:02 -07:00
John Gardiner Myers
5aae0af68a Add DynamoDB registry implementation 2023-06-18 16:49:58 -07:00
John Gardiner Myers
794a10dfbe Use common code for creating AWS sessions 2023-06-18 16:47:37 -07:00
Thomas Kosiewski
23326bd4bf
Added traefik-proxy to source docs string
Signed-off-by: Thomas Kosiewski <thoma471@googlemail.com>
2023-06-02 12:47:34 +02:00
Thomas Kosiewski
95abe994c4
Merge remote-tracking branch 'kubernetes-sigs/master' 2023-06-01 18:49:38 +02:00
Kubernetes Prow Robot
f56e2f6198
Merge pull request #1828 from vsychov/txt-encryption
Try #3: Support encrypted DNS txt records
2023-05-09 10:47:57 -07:00
Megum1n
028656d649
Change variable type and description 2023-05-08 12:08:00 +02:00
Arnaud Lefray
56773c0430
chore: merge with master 2023-05-04 15:23:10 +02:00
Viacheslav Sychov
2554f9f879 #1828: Support encrypted DNS txt records
Signed-off-by: Viacheslav Sychov <viacheslav.sychov@gmail.com>
2023-04-28 20:29:54 +02:00
Charles Xu
5e6f1a8b16 rename option to 'resolveServiceLoadBalancerHostname' 2023-04-23 16:25:13 -07:00
Charles Xu
1d232c4b86 feat: resolve LB-type Service hostname to create A/AAAA instead of CNAME 2023-04-18 21:10:56 -07:00
Kubernetes Prow Robot
e48ec6b241
Merge pull request #2461 from johngmyers/quad-a
Add support for AAAA records
2023-04-13 14:26:42 -07:00
megum1n
ac605fa4ce
Rename gloo-namespace flag back to singular word 2023-04-13 23:00:26 +02:00
Kubernetes Prow Robot
e7749e94d7
Merge pull request #1701 from ericrrath/oci-auth-instance-principal
OCI provider: add support for instance principal authentication
2023-04-11 06:43:06 -07:00
John Gardiner Myers
de1db3f03d Unit test fixes 2023-03-30 17:49:31 -07:00
Skyler Mäntysaari
6f42a8a2da Initial IPv6 support 2023-03-30 17:49:28 -07:00
Sewci0
815ff2a6d9
Fix cli docs 2023-03-29 14:00:24 +01:00
Thomas Kosiewski
458b702762 Added traefik source 2023-03-17 15:15:41 +01:00
megum1n
3d48d66c91
Add support for multiple gloo namespaces in one External DNS instance 2023-03-15 02:33:00 +01:00
Mikael Johansson
9a76be0202 Add F5 VirtualServer source 2023-03-14 10:23:56 +01:00
Kubernetes Prow Robot
b3a7698554
Merge pull request #3364 from arturhoo/cloudflare-paginated-list-requests
cloudflare - customizable pagination when listing DNS records
2023-03-02 07:30:55 -08:00
Artur Rodrigues
789190d565
Parametize cloudflare dns records per page
Signed-off-by: Artur Rodrigues <artur.rodrigues@lacework.net>
2023-02-17 13:21:11 +00:00
Artur Rodrigues
81068bc1ce
Remove unused cloudflare pagination options
Signed-off-by: Artur Rodrigues <artur.rodrigues@lacework.net>
2023-02-17 13:21:10 +00:00
Craig Post
fabc588750
Added name~ regex match to infoblox with --infoblox-name-regex argument 2023-02-10 13:29:53 -07:00
Andy Bursavich
13d978caeb gateway-api: upgrade from v0.5.1 to v0.6.0 and add GRPCRoute support 2023-01-04 08:18:35 -08:00
Jonas Badstübner
0ef72c7eb9 [flags/provider] handle providers DRY-style 2022-12-14 10:21:25 +01:00
Jonas Badstübner
240aaaec02 [flags/provider] add gone providers 2022-12-14 10:14:47 +01:00
Jonas Badstübner
b2afcdd854 [flags/provider] add civo; order alphabetically 2022-12-14 10:05:19 +01:00
Sergiusz Urbaniak
d81aeb3194
pkg/apis/externaldns/types.go: add civo 2022-11-20 20:22:43 +01:00
Andrea Florio
cc2c3878c4 use gofmt to fix lint issues 2022-11-07 13:35:16 +00:00
Andrea Florio
b5dc865e11
completed pi-hole 2022-10-31 23:07:44 +01:00
Andy Bursavich
74ffff6c26 gofumpt 2022-09-20 20:48:57 -07:00
Lukasz Zajaczkowski
0b2d3ed109 rebase 2022-09-15 14:59:36 +02:00
DavidSpek
62848b5a85 Implement plural provider
add plural to provider enum

go mod tidy

remove gitlab-ci

Signed-off-by: DavidSpek <vanderspek.david@gmail.com>

cleanup

Signed-off-by: DavidSpek <vanderspek.david@gmail.com>
2022-09-15 14:48:22 +02:00
misakazhou
a2e7ffc36a add the provider for the tencent cloud.
Signed-off-by: misakazhou <misakazhou@tencent.com>
2022-09-15 16:42:39 +08:00
Kubernetes Prow Robot
1f0f004d33
Merge pull request #2818 from PG2000/master
support ExternalID in AWS Provider when assuming a role
2022-08-19 08:41:52 -07:00
pg2000
03a28eea6e
Update pkg/apis/externaldns/types.go
Co-authored-by: Nick Jüttner <nick@juni.io>
2022-08-19 16:50:17 +02:00
Kubernetes Prow Robot
e2b86a1146
Merge pull request #2693 from tobikris/add-target-net-filter
add target filters based on network
2022-08-02 01:38:15 -07:00
pg2000
52c8edebab
replace Id with ID
Co-authored-by: Steven E. Harris <seh@panix.com>
2022-06-27 20:56:39 +02:00
pg2000
ff56bf8090
replace Id with ID
Co-authored-by: Steven E. Harris <seh@panix.com>
2022-06-27 20:56:29 +02:00
pg2000
fd68732cd5
replace Id with ID
Co-authored-by: Steven E. Harris <seh@panix.com>
2022-06-27 20:56:21 +02:00
pg2000
026e15b1aa
replace Id with ID
Co-authored-by: Steven E. Harris <seh@panix.com>
2022-06-27 20:56:07 +02:00
pg2000
d327ff7f6d
replace Id with ID
Co-authored-by: Steven E. Harris <seh@panix.com>
2022-06-27 20:55:47 +02:00
pg2000
4ace07f0a2
support ExternalID in AWS Provider when assuming a role 2022-06-15 18:49:31 +02:00
Kubernetes Prow Robot
de1db79bad
Merge pull request #2707 from hughhuangzh/add_ibmcloud_provider
Add IBM Cloud provider
2022-05-26 01:39:23 -07:00
Kubernetes Prow Robot
66e0d8c7fe
Merge pull request #2292 from abursavich/gateway-redo
Add Support for Gateway API Route Sources
2022-05-25 01:20:44 -07:00
hzhihui
57aa72f279
Merge branch 'master' into add_ibmcloud_provider 2022-04-20 09:00:16 +08:00
Kubernetes Prow Robot
01e8a2c269
Merge pull request #2703 from scottd018/feat-restrict-rfc2136-sensitive-values
feat: restrict rfc2136 kerberos password from being exposed in logs
2022-04-19 01:39:17 -07:00
Dinar Valeev
25c7cb28ea
Add additional txt record with record type marker
In order to track multiple record types with the same name, lets migrate
to new format, were record name contains record type in it.

Signed-off-by: Dinar Valeev <dinar.valeev@absa.africa>
2022-04-14 16:39:36 +02:00
hzhihui
4703c11741 Add IBM Cloud provider 2022-04-14 11:53:16 +08:00
Dustin Scott
d035ecce71
feat: restrict rfc2136 kerberos password from being exposed in logs
Signed-off-by: Dustin Scott <sdustin@vmware.com>
2022-04-11 10:19:41 -05:00
Tobias Krischer
692f2bbc23
add target filters based on network 2022-04-08 19:29:58 +02:00
Rafal Korepta
4f6ab703c1 Revert hetzner plugin 2022-03-09 22:20:14 +01:00
Andy Bursavich
71e45ce1d3 gateway-udproute: add source 2022-02-24 21:30:10 -08:00
Andy Bursavich
52e3fd61db gateway-tcproute: add source 2022-02-24 21:30:10 -08:00