stsaid
5a1715b582
fixed issue in iteration of recordset/zone-results from azure.
2019-11-03 07:49:55 +01:00
Tim Jacomb
4f08319438
Fix Azure tests
2019-11-03 07:49:53 +01:00
Tim Jacomb
186906e1e3
Fix iteration and mock, no infinite loop
2019-11-03 07:49:52 +01:00
Tim Jacomb
0bc324d0c8
Remove unused ttl field
2019-11-03 07:49:50 +01:00
stsaid
5d556868f1
Reworked azuresdk usage ( #1 )
2019-11-03 07:49:49 +01:00
Tim Jacomb
bb9edf7993
Use mocks properly
2019-11-03 07:49:46 +01:00
Tim Jacomb
a00676c032
Update function signatures to match SDK
2019-11-03 07:49:46 +01:00
Tim Jacomb
b74b5ee5c4
Update value
2019-11-03 07:49:46 +01:00
Tim Jacomb
8aa61d3ce3
Update to new function names
2019-11-03 07:49:46 +01:00
Tim Jacomb
d333ecd508
Some test compilation fixes
2019-11-03 07:49:46 +01:00
Tim Jacomb
f170849b42
It compiles!
2019-11-03 07:49:44 +01:00
Tim Jacomb
aafe52b7d6
WIP Upgrade client-go + azure sdk
2019-11-03 07:49:29 +01:00
Tim Jacomb
7be10ecbff
WIP
2019-11-03 07:48:43 +01:00
Vincent Desjardins
ce94d2f328
Google Provider: add support for batch interval.
...
The parameter is google-batch-change-interval.
Default value is 2s.
2019-11-01 21:27:21 -04:00
Nick Jüttner
f763d2a413
Move into kubernetes-sigs organization ( #1245 )
...
* Move into kubernetes-sigs organization
* Disable labeler action for forks
2019-11-01 17:10:19 +01:00
Vincent Desjardins
ce2eadcd66
Google Provider: add support for batching updates
...
The parameter is google-batch-change-size.
Default value is 1000.
2019-10-31 13:41:02 -04:00
Kubernetes Prow Robot
805555872e
Merge pull request #1242 from kubernetes-incubator/labeler
...
Adding labels on PR
2019-10-29 09:44:42 -07:00
Nick Jüttner
1663574a25
Merge pull request #1243 from kubernetes-incubator/njuettner-patch-1
...
Update labeler.yml
2019-10-29 17:25:54 +01:00
Nick Jüttner
235edcbebd
Update labeler.yml
2019-10-29 17:25:34 +01:00
njuettner
ad17f21a1f
Adding labels on PR
2019-10-29 16:40:37 +01:00
Kubernetes Prow Robot
eaf7ae5ce0
Merge pull request #1218 from skoef/nodeSource
...
added support for using nodes as source
2019-10-25 08:56:40 -07:00
Reinier Schoof
0c547a9809
added description to exported function
2019-10-25 16:25:02 +02:00
Reinier Schoof
5667d0b14e
remove obsolete comment
2019-10-25 16:00:38 +02:00
Reinier Schoof
b6ec8557ae
honor ttlAnnotationKey for node endpoints
2019-10-24 17:02:29 +02:00
Reinier Schoof
fee7046e72
error when no node address could be found
2019-10-24 16:22:31 +02:00
Reinier Schoof
c6943f8c52
Merge pull request #1 from linki/nodeSource
...
Group equal DNS names into same endpoint
2019-10-24 14:12:55 +02:00
Martin Linkhorst
02f40d787a
source: group equal DNS names into same endpoint
2019-10-24 11:21:06 +02:00
Piotr Jander
36a8ec987a
Update aws.md
2019-10-18 13:51:27 +02:00
Zoltán Reegn
aff20c1ff7
docs: use apps/v1 instead of extensions/v1beta1 in Deployment examples
...
The extensions/v1beta1 API is deprecated for Deployment and with 1.16 is
not served by default anymore. This breaks the examples on k8s 1.16.
See this blog post for details on the deprecations:
https://kubernetes.io/blog/2019/07/18/api-deprecations-in-1-16/
2019-10-15 22:33:11 +02:00
Kubernetes Prow Robot
cec75d7da4
Merge pull request #1223 from dgrizzanti/namespace_doc_updates
...
Propose a few doc changes to make the use of namespace more clear
2019-10-15 03:47:52 -07:00
David Grizzanti
c4db4af310
Propose a few doc changes to make the use of namespace more clear
2019-10-08 09:54:59 -04:00
Kubernetes Prow Robot
85274ace0b
Merge pull request #1164 from h3ndrk/master
...
Change ApplyChanges in RFC2136 to batch update
2019-10-08 03:31:11 -07:00
Kubernetes Prow Robot
59475a1c5c
Merge pull request #1206 from dooman87/patch-1
...
#582 : Unknown Serviceaccount error
2019-10-08 03:09:11 -07:00
Reinier Schoof
4325d7368b
respect controller annotation for node source
2019-10-01 11:39:09 +02:00
Reinier Schoof
16194ca9cf
implemented annotationFilter for node source
2019-10-01 11:26:47 +02:00
Reinier Schoof
a491d8f6a2
added support for using nodes as source
2019-10-01 09:27:06 +02:00
Kubernetes Prow Robot
8db7e77d78
Merge pull request #1149 from dkeightley/master
...
Add RBAC manifest, update wording around IAM policy
2019-09-24 04:49:27 -07:00
Pokidov N. Dmitry
aa2b4589cd
#582 : Unknown Serviceaccount error
...
Seems like there was attempts to fix it but change didn't make it to master
2019-09-24 10:26:37 +10:00
Kubernetes Prow Robot
94246643cf
Merge pull request #1197 from linki/go-mod-tidy
...
Run go mod tidy with go 1.13
v0.5.17
2019-09-17 08:38:25 -07:00
Martin Linkhorst
9193c5711a
chore: run go mod tidy with go v1.13
2019-09-17 17:18:58 +02:00
Kubernetes Prow Robot
1b3e680903
Merge pull request #1196 from kubernetes-incubator/v0.5.17
...
v0.5.17
2019-09-17 07:42:27 -07:00
njuettner
885c9e70e0
v0.5.17
...
Signed-off-by: njuettner <nick@zalando.de>
2019-09-17 16:22:04 +02:00
Kubernetes Prow Robot
40ede2557c
Merge pull request #1189 from Evesy/cf_token
...
Support Cloudflare API Token Auth
2019-09-17 04:12:23 -07:00
Mike Eves
3580908ce4
Formatting
2019-09-17 11:30:24 +01:00
Mike Eves
0f234eade4
Small syntax change
2019-09-17 11:27:14 +01:00
Kubernetes Prow Robot
802372b68f
Merge pull request #1184 from tariq1890/go113
...
upgrade go version to 1.13 in external-dns
2019-09-17 01:26:24 -07:00
Kubernetes Prow Robot
f986d20c5a
Merge pull request #1193 from greut/egoscale-0.18.x
...
exoscale: add context support
2019-09-17 00:44:24 -07:00
Yoan Blanc
ab08d84c0e
exoscale: add context support
...
Signed-off-by: Yoan Blanc <yoan@dosimple.ch>
2019-09-16 16:12:01 +02:00
Kubernetes Prow Robot
894360a1dd
Merge pull request #1185 from serialx/fix-amazon-iam-roles-service-account
...
Fix AWS IAM Roles for Service Accounts permission problem.
2019-09-16 02:48:37 -07:00
Brian Hong
c97781a49d
Fix AWS IAM Roles for Service Accounts permission
...
Amazon EKS supports IAM Roles for Service Accounts. It mounts tokens
files to `/var/run/secrets/eks.amazonaws.com/serviceaccount/token`.
Unfortunately, external-dns runs as 'nobody' so it cannot access this
file. External DNS is then unable to make any AWS API calls to work:
```
time="2019-09-11T07:31:53Z" level=error msg="WebIdentityErr: unable to read file at /var/run/secrets/eks.amazonaws.com/serviceaccount/token\ncaused by: open /var/run/secrets/eks.amazonaws.com/serviceaccount/token: permission denied"
```
See: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-technical-overview.html
Below are the file permissions mounted on External DNS pod:
```
~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/
total 0
drwxrwxrwt 3 root root 100 Sep 11 06:40 .
drwxr-xr-x 3 root root 28 Sep 11 06:40 ..
drwxr-xr-x 2 root root 60 Sep 11 06:40 ..2019_09_11_06_40_49.865776187
lrwxrwxrwx 1 root root 31 Sep 11 06:40 ..data -> ..2019_09_11_06_40_49.865776187
lrwxrwxrwx 1 root root 12 Sep 11 06:40 token -> ..data/token
~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token
-rw------- 1 root root 1028 Sep 11 06:40 /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token
```
This commit fixes this problem by specifying securityContext to make
mounted volumes with 65534 (nobody) group ownership.
2019-09-16 17:01:07 +09:00