4924 Commits

Author SHA1 Message Date
stsaid
5a1715b582 fixed issue in iteration of recordset/zone-results from azure. 2019-11-03 07:49:55 +01:00
Tim Jacomb
4f08319438 Fix Azure tests 2019-11-03 07:49:53 +01:00
Tim Jacomb
186906e1e3 Fix iteration and mock, no infinite loop 2019-11-03 07:49:52 +01:00
Tim Jacomb
0bc324d0c8 Remove unused ttl field 2019-11-03 07:49:50 +01:00
stsaid
5d556868f1 Reworked azuresdk usage (#1) 2019-11-03 07:49:49 +01:00
Tim Jacomb
bb9edf7993 Use mocks properly 2019-11-03 07:49:46 +01:00
Tim Jacomb
a00676c032 Update function signatures to match SDK 2019-11-03 07:49:46 +01:00
Tim Jacomb
b74b5ee5c4 Update value 2019-11-03 07:49:46 +01:00
Tim Jacomb
8aa61d3ce3 Update to new function names 2019-11-03 07:49:46 +01:00
Tim Jacomb
d333ecd508 Some test compilation fixes 2019-11-03 07:49:46 +01:00
Tim Jacomb
f170849b42 It compiles! 2019-11-03 07:49:44 +01:00
Tim Jacomb
aafe52b7d6 WIP Upgrade client-go + azure sdk 2019-11-03 07:49:29 +01:00
Tim Jacomb
7be10ecbff WIP 2019-11-03 07:48:43 +01:00
Vincent Desjardins
ce94d2f328
Google Provider: add support for batch interval.
The parameter is google-batch-change-interval.
Default value is 2s.
2019-11-01 21:27:21 -04:00
Nick Jüttner
f763d2a413 Move into kubernetes-sigs organization (#1245)
* Move into kubernetes-sigs organization

* Disable labeler action for forks
2019-11-01 17:10:19 +01:00
Vincent Desjardins
ce2eadcd66
Google Provider: add support for batching updates
The parameter is google-batch-change-size.
Default value is 1000.
2019-10-31 13:41:02 -04:00
Kubernetes Prow Robot
805555872e
Merge pull request #1242 from kubernetes-incubator/labeler
Adding labels on PR
2019-10-29 09:44:42 -07:00
Nick Jüttner
1663574a25
Merge pull request #1243 from kubernetes-incubator/njuettner-patch-1
Update labeler.yml
2019-10-29 17:25:54 +01:00
Nick Jüttner
235edcbebd
Update labeler.yml 2019-10-29 17:25:34 +01:00
njuettner
ad17f21a1f Adding labels on PR 2019-10-29 16:40:37 +01:00
Kubernetes Prow Robot
eaf7ae5ce0
Merge pull request #1218 from skoef/nodeSource
added support for using nodes as source
2019-10-25 08:56:40 -07:00
Reinier Schoof
0c547a9809 added description to exported function 2019-10-25 16:25:02 +02:00
Reinier Schoof
5667d0b14e remove obsolete comment 2019-10-25 16:00:38 +02:00
Reinier Schoof
b6ec8557ae honor ttlAnnotationKey for node endpoints 2019-10-24 17:02:29 +02:00
Reinier Schoof
fee7046e72 error when no node address could be found 2019-10-24 16:22:31 +02:00
Reinier Schoof
c6943f8c52
Merge pull request #1 from linki/nodeSource
Group equal DNS names into same endpoint
2019-10-24 14:12:55 +02:00
Martin Linkhorst
02f40d787a source: group equal DNS names into same endpoint 2019-10-24 11:21:06 +02:00
Piotr Jander
36a8ec987a
Update aws.md 2019-10-18 13:51:27 +02:00
Zoltán Reegn
aff20c1ff7 docs: use apps/v1 instead of extensions/v1beta1 in Deployment examples
The extensions/v1beta1 API is deprecated for Deployment and with 1.16 is
not served by default anymore. This breaks the examples on k8s 1.16.

See this blog post for details on the deprecations:

https://kubernetes.io/blog/2019/07/18/api-deprecations-in-1-16/
2019-10-15 22:33:11 +02:00
Kubernetes Prow Robot
cec75d7da4
Merge pull request #1223 from dgrizzanti/namespace_doc_updates
Propose a few doc changes to make the use of namespace more clear
2019-10-15 03:47:52 -07:00
David Grizzanti
c4db4af310 Propose a few doc changes to make the use of namespace more clear 2019-10-08 09:54:59 -04:00
Kubernetes Prow Robot
85274ace0b
Merge pull request #1164 from h3ndrk/master
Change ApplyChanges in RFC2136 to batch update
2019-10-08 03:31:11 -07:00
Kubernetes Prow Robot
59475a1c5c
Merge pull request #1206 from dooman87/patch-1
#582: Unknown Serviceaccount error
2019-10-08 03:09:11 -07:00
Reinier Schoof
4325d7368b respect controller annotation for node source 2019-10-01 11:39:09 +02:00
Reinier Schoof
16194ca9cf implemented annotationFilter for node source 2019-10-01 11:26:47 +02:00
Reinier Schoof
a491d8f6a2 added support for using nodes as source 2019-10-01 09:27:06 +02:00
Kubernetes Prow Robot
8db7e77d78
Merge pull request #1149 from dkeightley/master
Add RBAC manifest, update wording around IAM policy
2019-09-24 04:49:27 -07:00
Pokidov N. Dmitry
aa2b4589cd
#582: Unknown Serviceaccount error
Seems like there was attempts to fix it but change didn't make it to master
2019-09-24 10:26:37 +10:00
Kubernetes Prow Robot
94246643cf
Merge pull request #1197 from linki/go-mod-tidy
Run go mod tidy with go 1.13
v0.5.17
2019-09-17 08:38:25 -07:00
Martin Linkhorst
9193c5711a chore: run go mod tidy with go v1.13 2019-09-17 17:18:58 +02:00
Kubernetes Prow Robot
1b3e680903
Merge pull request #1196 from kubernetes-incubator/v0.5.17
v0.5.17
2019-09-17 07:42:27 -07:00
njuettner
885c9e70e0 v0.5.17
Signed-off-by: njuettner <nick@zalando.de>
2019-09-17 16:22:04 +02:00
Kubernetes Prow Robot
40ede2557c
Merge pull request #1189 from Evesy/cf_token
Support Cloudflare API Token Auth
2019-09-17 04:12:23 -07:00
Mike Eves
3580908ce4 Formatting 2019-09-17 11:30:24 +01:00
Mike Eves
0f234eade4 Small syntax change 2019-09-17 11:27:14 +01:00
Kubernetes Prow Robot
802372b68f
Merge pull request #1184 from tariq1890/go113
upgrade go version to 1.13 in external-dns
2019-09-17 01:26:24 -07:00
Kubernetes Prow Robot
f986d20c5a
Merge pull request #1193 from greut/egoscale-0.18.x
exoscale: add context support
2019-09-17 00:44:24 -07:00
Yoan Blanc
ab08d84c0e
exoscale: add context support
Signed-off-by: Yoan Blanc <yoan@dosimple.ch>
2019-09-16 16:12:01 +02:00
Kubernetes Prow Robot
894360a1dd
Merge pull request #1185 from serialx/fix-amazon-iam-roles-service-account
Fix AWS IAM Roles for Service Accounts permission problem.
2019-09-16 02:48:37 -07:00
Brian Hong
c97781a49d
Fix AWS IAM Roles for Service Accounts permission
Amazon EKS supports IAM Roles for Service Accounts. It mounts tokens
files to `/var/run/secrets/eks.amazonaws.com/serviceaccount/token`.
Unfortunately, external-dns runs as 'nobody' so it cannot access this
file. External DNS is then unable to make any AWS API calls to work:

```
time="2019-09-11T07:31:53Z" level=error msg="WebIdentityErr: unable to read file at /var/run/secrets/eks.amazonaws.com/serviceaccount/token\ncaused by: open /var/run/secrets/eks.amazonaws.com/serviceaccount/token: permission denied"
```

See: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-technical-overview.html

Below are the file permissions mounted on External DNS pod:

```
~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/
total 0
drwxrwxrwt    3 root     root           100 Sep 11 06:40 .
drwxr-xr-x    3 root     root            28 Sep 11 06:40 ..
drwxr-xr-x    2 root     root            60 Sep 11 06:40 ..2019_09_11_06_40_49.865776187
lrwxrwxrwx    1 root     root            31 Sep 11 06:40 ..data -> ..2019_09_11_06_40_49.865776187
lrwxrwxrwx    1 root     root            12 Sep 11 06:40 token -> ..data/token
~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token
-rw-------    1 root     root          1028 Sep 11 06:40 /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token
```

This commit fixes this problem by specifying securityContext to make
mounted volumes with 65534 (nobody) group ownership.
2019-09-16 17:01:07 +09:00