123 Commits

Author SHA1 Message Date
João Marçal
cb3f8c9ca5 Fixed some formating mistakes
Signed-off-by: João Marçal <joao.marcal12@gmail.com>
2019-07-18 11:27:18 +02:00
João Marçal
9f6ebfa06d Fixed unused assignment
Signed-off-by: João Marçal <joao.marcal12@gmail.com>
2019-07-18 11:05:56 +02:00
João Marçal
6bf1c2bcb5 Added "external-dns/resource=..." field to CRDs usefull to solve conflits
Added warning when CR has a target with a "." in the end, which would make external-dns contantly add and remove the record

Signed-off-by: João Marçal <joao.marcal12@gmail.com>
2019-07-18 10:11:34 +02:00
twilfong
0a7c3ba271 minor format change to make travis linter happy 2019-06-28 17:07:37 -07:00
twilfong
172747e578 add test for dualstack label to Ingress test 2019-06-28 10:40:58 -07:00
twilfong
bafd7b22bb small formatting change to make travis happy 2019-06-27 10:26:53 -07:00
twilfong
d68d06f17c add dualstack support for AWS provider with ALB ingress controllers 2019-06-26 18:05:22 -07:00
Kubernetes Prow Robot
58c9b2e321
Merge pull request #1029 from arturo-c/fix-panic-crd
Fix panic on empty targets for custom resources.
2019-06-08 10:41:06 -07:00
Arturo Contreras
bde9957e48 Rename endPoint to endpoint for crd implementation. 2019-06-04 11:52:36 -06:00
Anton Mironov
6b91201420 Fix indentation 2019-06-04 17:09:48 +03:00
Nick Jüttner
c4dce019dd
Merge branch 'master' into external-services 2019-06-04 15:08:18 +02:00
Kubernetes Prow Robot
ed40405f12
Merge pull request #1023 from yverbin/602-nodeport-trafficpolicy
602 nodeport trafficpolicy
2019-06-04 05:47:13 -07:00
Arturo Contreras
5df90d6900 Add crd check for empty targets. 2019-05-20 09:29:25 -06:00
Anand Patel
edfc413e48
add empty source 2019-05-17 11:40:20 -04:00
Dave Grizzanti
7a6d233bd7 fix route/cloudfoundry test 2019-05-10 12:28:32 -04:00
Dave Grizzanti
002a85e92a Rebase and address PR comments 2019-05-10 12:09:54 -04:00
Dave Grizzanti
ef88346b9b Rebase for go modules 2019-05-10 11:38:54 -04:00
Dave Grizzanti
668a557dea Update for failing tests 2019-05-10 11:34:57 -04:00
Dave Grizzanti
b529a92d5b Add Cloud Foundry routes as a source 2019-05-10 11:34:57 -04:00
Anton Mironov
e8c1b030dc Add support for ExternalName services
Related issue: #861
2019-05-09 17:40:19 +03:00
Yaroslav Verbin
0d4d475a4e add test case 2019-04-18 18:08:04 +03:00
Yaroslav Verbin
2b1e1d9eff related to https://github.com/kubernetes-incubator/external-dns/issues/602 2019-04-18 18:07:20 +03:00
Yaroslav Verbin
1798dbdfb5 proper field formatting 2019-04-18 11:23:28 +03:00
Yaroslav Verbin
0d608fd018 create missing DNS entry. fix https://github.com/kubernetes-incubator/external-dns/issues/964 2019-04-16 19:13:26 +03:00
njuettner
76c09dab1f Switch to go modules 2019-04-09 17:22:36 +02:00
Michael Venezia
756c66066d
Bumping istio to 1.1.0, updating fake GatewayConfigStore Get method to work with 1.1.0 2019-03-25 14:05:48 -04:00
Kubernetes Prow Robot
d027662775
Merge pull request #917 from jlamillan/jlamillan/use_informer_cache
Use k8s informer cache instead of making active API GET requests
2019-03-22 10:38:52 -07:00
Christian Glombek
0076e4156c Add support for multiple Istio Ingress Gateways
The --istio-ingress-gateway flag may now be specified multiple times.
2019-03-18 22:13:44 +01:00
jlamillan
73d34db670
Use k8s informer cache instead of active API server calls in ingress and service sources. 2019-02-25 20:07:00 -08:00
Anand Patel
ed71ab6fb6 fix broken test after merge 2019-02-14 15:30:31 -05:00
Anand Patel
60a79b698b merge with master 2019-02-14 15:17:03 -05:00
Nick Jüttner
6d39526069
Merge branch 'master' into cloudflare-proxied-annotation 2019-01-24 11:16:54 +01:00
Kubernetes Prow Robot
92ae0e5042
Merge pull request #645 from toshipp/support-multiple-ips
Support A record for multile IPs for a headless services.
2019-01-23 08:45:23 -08:00
Anand Patel
a023ad7475 merge with master 2019-01-18 10:54:24 -05:00
xunpan
fc245c088d avoid unnecessary updating for CRD resource
with test updated
2018-12-13 02:35:18 -05:00
David Schneider
59f0022b6d Change default apiversion of crd
- Change default apiversion of DNSEndpoint
- Add error to output CRDClient
2018-11-16 18:41:06 +01:00
Anand Patel
230113c7b8 Merge branch 'master' of github.com:kubernetes-incubator/external-dns into feature/ignore-annotations 2018-11-16 14:21:23 -03:00
Erik Swets
e0e7a9defd Allow setting Cloudflare proxying by annotation 2018-11-16 12:52:47 +01:00
vaegt
0af588317b
Remove unnecessary slashes 2018-11-09 11:11:39 +01:00
Anand Patel
3454363d67 allow hostname annotations to be ignored 2018-10-17 17:17:15 -04:00
vaegt
bb80f99e17
Add alias annotation for ingress 2018-10-16 13:30:07 +02:00
Pascal
05c7601e7a Continue even if node listing fails 2018-09-19 22:17:15 +02:00
Jonas Michel
b9b6842195 Add Source implementation for Istio Gateway (#694)
* add Istio Gateway Source

* add documentation for Istio Gateway Source

* make both istio namespace and ingress gateway service configurable

* prefix gateway types, constructors, and flags with 'istio-'

* fix: add missing sources to source flag docs
2018-09-06 16:39:32 +02:00
Nick Jüttner
488f10394a
Merge branch 'master' into generic-source 2018-09-03 10:55:12 +02:00
shashidharatd
79ad3a8b1a Add unit tests for crd source 2018-08-22 19:37:21 +05:30
shashidharatd
18aee82d3d Add crd source which gets Endpoints from CRD 2018-08-22 19:37:21 +05:30
Devatoria
05068e3ad3 Add filter by service type feature 2018-08-17 17:14:44 +02:00
Julian Vassev
e6cae22ec4 Configure req timeout calling k8s APIs
When running in a pod sometimes the request to get ingreses/services
stalls indefinitely. A simple pod restart fixes this. Hard to reproduce
but I got lucky and did thread dump which revealed a gorouting blocked
on call to k8s.

What's new is a `--request-timeout` flag that makes requests to k8s
bounded in time. The default is 30s - this may cause some deployments
with a slow api-server to timeout.
2018-08-16 02:59:21 -07:00
shashidharatd
e26b73e73f Fix usage of k8s.io/client-go package 2018-07-31 23:02:03 +05:30
Toshikuni Fukaya
44f319e6a0 Support A record for multile IPs for a headless services.
Non statefulset pods associating to a headless service have different
IPs, but have a same hostname. In this case, external-dns registered
only one A record due to attempting to register multiple A records for
a same hostname for each IP.
This patch now registers one A record having multiple IPs.
2018-07-27 19:20:27 +09:00