4924 Commits

Author SHA1 Message Date
John Gardiner Myers
ff7412a844 Represent AWS Alias records as record type A 2023-09-02 17:54:50 -07:00
jbpaux
ae71b6c286 fix fmt to pass lint 2023-09-03 00:33:45 +02:00
jbpaux
b0ac8184ed azure: add aaaa tests 2023-09-01 23:25:23 +02:00
jbpaux
e9fb8a8f36 azure: add aaaa support 2023-09-01 23:24:35 +02:00
Igor Beliakov
a1c2775d45 feat(azure): add support for workload identity
Signed-off-by: Igor Beliakov <demtis.register@gmail.com>
2023-09-01 19:08:42 +02:00
Kubernetes Prow Robot
b2de466aa5
Merge pull request #3862 from johngmyers/epkey-refactor
Use common EndpointKey type
2023-09-01 07:54:57 -07:00
Kubernetes Prow Robot
0a6574a982
Merge pull request #3860 from johngmyers/refactor
Remove DomainFilterInterface
2023-09-01 07:54:50 -07:00
Shreyas Mhatre
c70e5f853e
Update aws.go for issue #3833 (#3834)
* Update aws.go for issue #3833

Fix to add ap-south-2 region to support elb and nlb

* Update provider/aws/aws.go

Added missing quotes

Co-authored-by: Raffaele Di Fazio <raffo@github.com>

* Update provider/aws/aws.go

Added missing quotes

Co-authored-by: Raffaele Di Fazio <raffo@github.com>

---------

Co-authored-by: Raffaele Di Fazio <raffo@github.com>
2023-09-01 07:54:43 -07:00
Kubernetes Prow Robot
6244c442cb
Merge pull request #3040 from phillebaba/feature/azure-sdk
Update Azure SDK and remove deprecated autorest dependency
2023-09-01 07:54:32 -07:00
Malek Adawi
e7f383c0db
Update provider/godaddy/godaddy.go
Co-authored-by: Michel Loiseleur <97035654+mloiseleur@users.noreply.github.com>
2023-09-01 13:27:46 +03:00
Will Hegedus
a2fedbc1dd fix(linode): don't try to create existing records
A bug in the Linode provider can result in an unbounded explosion of TXT records being created.
For example, if external-dns attempts to create a CNAME in a zone that has a conflicting A record,
it will fail but will still create 2 new TXT records every single time.

Instead, we can just skip creating records that already exist since they should
only ever be in the list of updates.
2023-08-31 19:18:55 -04:00
Kubernetes Prow Robot
f17e24ff8a
Merge pull request #3870 from mloiseleur/fix/log
fix: remove useless warning log messages for instrumented_http.Transport
2023-08-31 09:16:48 -07:00
Michel Loiseleur
f04e72e15c review 2023-08-30 09:07:44 +02:00
Kyle Cronin
cf756a76b2 Extract record types conflict resolver 2023-08-29 23:41:46 -04:00
John Gardiner Myers
50e456997f Create the "resource" label for Ambassador Host 2023-08-29 11:36:30 -07:00
John Gardiner Myers
39955e556e Refactor setting the "resource" label into endpointsForHostname 2023-08-29 11:36:27 -07:00
Timofey Titovets
2a1f7a4de7 fix(source_test.go): add missing pod status tests 2023-08-29 19:16:51 +02:00
Timofey Titovets
f696c514db fix: nodePort #2704 - publish ready endpoints
fix: lowercase local functions
chore: reuse nodes, cut logs
2023-08-29 19:16:51 +02:00
Kubernetes Prow Robot
79196a16a1
Merge pull request #3897 from jwitrick/master
aws: add ap-southeast-4 region
2023-08-28 11:44:12 -07:00
Justin Witrick
c00a24af55 aws: add ap-southeast-4 region
This change adds support for LB in ap-southeast-4
2023-08-28 10:31:19 -04:00
Kubernetes Prow Robot
f2fa97e6f0
Merge pull request #3899 from johngmyers/staging-image
Fixes to staging image build
2023-08-28 06:17:43 -07:00
John Gardiner Myers
376d42c0a4 Fixes to staging image build 2023-08-27 13:12:40 -07:00
Kubernetes Prow Robot
5426005874
Merge pull request #3835 from johngmyers/ko
Build image with ko
2023-08-26 07:23:22 -07:00
Michel Loiseleur
955f755508 fix: discard unwanted logs 2023-08-25 12:27:57 +02:00
Kubernetes Prow Robot
820ac05e92
Merge pull request #3695 from allurisravanth/master
loop through all hosted zones to match the domain record
2023-08-25 00:15:17 -07:00
Gaëtan Faugère
81e17fd122
refactor(gandi): improve tests to be more readable, robusts, and extensible 2023-08-24 14:45:32 +02:00
Gaëtan Faugère
c5b488df4e
fix(gandi): conversion to @ for apex domains is not robust 2023-08-24 14:02:51 +02:00
Gaëtan Faugère
5a6e12f254
fix(gandi): TTL field not filled when fetching endpoints 2023-08-24 14:02:51 +02:00
Kubernetes Prow Robot
24b40383cb
Merge pull request #3869 from matusf/fix/pdns-conform-with-other-providers
fix!: align PDNS provider by removing MatchParent
2023-08-23 12:50:16 -07:00
Kubernetes Prow Robot
f367622dbc
Merge pull request #3842 from pendo-io/istio-ingress-resource
feat: add support for ingress backed istio gateways
2023-08-23 12:50:08 -07:00
Kubernetes Prow Robot
9deee07113
Merge pull request #3826 from avi-08/add-aws-api-gw-zones
Add AWS API gateway endpoint zoneId mappings
2023-08-23 12:49:57 -07:00
Malek Adawi
e312a36ba0 Support GoDaddy PENDING_DNS_ACTIVE domains 2023-08-22 22:38:23 +03:00
Kyle Cronin
20bff0aae5 Remove EndpointFilterInterface 2023-08-16 23:48:30 -04:00
Kyle Cronin
635da46f70 Remove unused validateOwner plan test function 2023-08-15 19:37:50 -04:00
Kyle Cronin
59054b02d8 Fix planning for multi-cluster dual stack record types
When AAAA multi-target / dual stack support was
added via #2461 it broke ownership of domains across
different clusters with different ingress records types.

For example if 2 clusters manage the same zone,
1 cluster uses A records and the other uses CNAME
records, when each record type is treated as a separate
planning record, it will cause ownership to bounce back
and forth and records to be constantly created and
deleted.

This change updates the planner to keep track of multiple
current records for a domain. This allows for A and AAAA
records to exist for a domain while allowing record type
changes.

The planner will ignore desired records for a domain that
represent conflicting record types allowed by RFC 1034 3.6.2.
For example if the desired records for a domain contains
a CNAME record plus any other record type no changes for
that domain will be planned.

The planner now contains an owned record filter provided
by the registry. This allows the planner to accurately plan
create updates when there are record type changes between
the current and desired endpoints. Without this filter the
planner could add create changes for domains not owned
by the controller.
2023-08-15 19:37:50 -04:00
Kyle Cronin
7fb144d8d8 Fix planning for multi-cluster dual stack record types
When AAAA multi-target / dual stack support was
added via #2461 it broke ownership of domains across
different clusters with different ingress records types.

For example if 2 clusters manage the same zone,
1 cluster uses A records and the other uses CNAME
records, when each record type is treated as a separate
planning record, it will cause ownership to bounce back
and forth and records to be constantly created and
deleted.

This change updates the planner to keep track of multiple
current records for a domain. This allows for A and AAAA
records to exist for a domain while allowing record type
changes.

The planner will ignore desired records for a domain that
represent conflicting record types allowed by RFC 1034 3.6.2.
For example if the desired records for a domain contains
a CNAME record plus any other record type no changes for
that domain will be planned.

The planner now contains an owned record filter provided
by the registry. This allows the planner to accurately plan
create updates when there are record type changes between
the current and desired endpoints. Without this filter the
planner could add create changes for domains not owned
by the controller.
2023-08-15 19:37:50 -04:00
Philip Laine
985a53217c
Update provider/azure/config.go
Co-authored-by: Michel Loiseleur <97035654+mloiseleur@users.noreply.github.com>
2023-08-15 09:06:11 +02:00
Philip Laine
55c93e7823
Update provider/azure/azure_private_dns.go
Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>
2023-08-15 09:05:28 +02:00
Philip Laine
d42df08c17
Update provider/azure/azure.go
Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>
2023-08-15 09:05:17 +02:00
Michel Loiseleur
8df1fc2902 fix: reintroduce klog replace 2023-08-14 17:29:21 +02:00
Predrag Janosevic
7ddc9daba7
exoscale provider: migrate to exoscale API v2 (#2917)
* exoscale provider: migrate to exoscale API v2

* exoscale: fix comment typo

* exoscale: remove debug line from test

* exoscale: replace endpoint config with environment

* exoscale: update Config

* Update pkg/apis/externaldns/types.go

Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>

* exoscale: document api zone & environment flags

* exoscale: update tutorial

* Sync deps with master

---------

Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>
2023-08-14 07:57:21 -07:00
Matúš Ferech
7aa9d25067
Align PDNS provider with other providers by removing MatchParent
PNDS provider is the only one which uses MatchParent functionality. The
MatchParent functionality breaks domain and regex domain filters. It
also makes PDNS provider behave differently than other providers while
having the same configuration. MatchParent can be replaced by using
multiple domain filters. After discussion with maintainers we concluded
that MatchParent should be removed.
2023-08-14 12:49:23 +02:00
Matúš Ferech
2e00d428f2
Add docs for regex domain filter 2023-08-14 11:14:43 +02:00
Matúš Ferech
806209544c
Add test for regex domain filter
This test is expected to fail and aims to show that regex domain filter
is not working.
2023-08-14 11:14:18 +02:00
Matúš Ferech
721c4e2110
Make TLS enabled by default for PowerDNS provider
All of the providers have TLS enabled by default so this change will
make PDNS provider behave as exected. Additionally, enabling TLS
by default is a good practice and previous bahaviour was a bit
misleading. It was possible to pass `--tls-ca` without
`--pdns-tls-enabled` and the PDNS provider would ignore the tls and
instantiate client with disabled tls. This change adds a flag to disable
the tls: `--pdns-skip-tls-verify`. Similar flag is used by pihole and
bluecat providers.

Additionaly this change makes providing custom TLS CA optional. It if is
not provided. A system certificates will be used. This makes PDNS behave
the same as other providers.
2023-08-14 11:06:43 +02:00
Matúš Ferech
7f61bbae44
Remove redundant test
Omited TLS config is the same as empty TLS config. It will default to
the same value.
2023-08-14 10:56:27 +02:00
Matúš Ferech
2d34694860
Refactor PDNS provider TLS tests
Use factory function which creates new PDNS provider. The only
changing argument is TLSConfig, so we can default all of the rest.
2023-08-14 10:56:25 +02:00
Kubernetes Prow Robot
c6a64396c2
Merge pull request #3865 from johngmyers/lint-timeout
Bump the timeout for golangci-lint
2023-08-12 22:43:19 -07:00
John Gardiner Myers
f36f126210 Bump the timeout for golangci-lint 2023-08-12 14:23:20 -07:00
Kubernetes Prow Robot
13d09b25d5
Merge pull request #3026 from rbeuque74/ovhcloud-cache
feat(ovh): add cache based on DNS zone SOA value
2023-08-12 13:41:18 -07:00