Commit Graph

122 Commits

Author SHA1 Message Date
Dave Grizzanti
ef88346b9b Rebase for go modules 2019-05-10 11:38:54 -04:00
Dave Grizzanti
81a3fde458 Removing changes to main 2019-05-10 11:34:57 -04:00
Dave Grizzanti
b529a92d5b Add Cloud Foundry routes as a source 2019-05-10 11:34:57 -04:00
Reinier Schoof
3323229ae0 Merge branch 'master' of github.com:kubernetes-incubator/external-dns into transipSupport 2019-05-07 13:23:47 +02:00
Reinier Schoof
a2b07c1383 added TransIP provider 2019-04-28 14:42:07 +02:00
mburtless
4fdeef3f2f Add flags for configuring custom NS1 endpoint and ignoring SSL verification for PrivateDNS support 2019-04-26 10:47:17 -04:00
mburtless
3d46e95f65 Add boilerplate to ns1 provider and tests and simplfy code for inititializing provider 2019-04-22 11:43:38 -04:00
mburtless
bff09c20c9 Initial Skeleton From NS1 Provider
This needs unit tests and a full integration test.

Pushing this as an initial checkpoint.
2019-04-22 11:43:38 -04:00
Christian Glombek
0076e4156c Add support for multiple Istio Ingress Gateways
The --istio-ingress-gateway flag may now be specified multiple times.
2019-03-18 22:13:44 +01:00
Kubernetes Prow Robot
c3702c9130
Merge pull request #895 from dsbrng25b/infoblox-dns-view
Infoblox provider support for DNS view
2019-03-18 09:44:22 -07:00
David Schneider
909e376387 Make view configurable for infoblox provider 2019-03-15 18:05:50 +01:00
Dimitrij Klesev
6da894253e
Run gofmt on main 2019-02-19 11:21:23 +01:00
Dimitrij Klesev
79bf8c807e
Add RcodeZero Anycast DNS provider 2019-02-19 11:20:15 +01:00
Anand Patel
60a79b698b merge with master 2019-02-14 15:17:03 -05:00
njuettner
8810311ca8 Resolving conflicts 2019-01-28 14:15:09 +01:00
Anand Patel
a023ad7475 merge with master 2019-01-18 10:54:24 -05:00
Joe Hohertz
7a28e3047a Adds a new flag --aws-api-retries which allows overriding the
number of retries that API calls will attempt before giving up.

This somewhat mitigates the issues discussed in #484 by allowing
the current sync attempt to complete vs. failing and starting anew.

Defaults to 3, which is what the aws-sdk-go defaults to where not
specified.

Signed-off-by: Joe Hohertz <joe@viafoura.com>
2019-01-17 12:37:27 -05:00
njuettner
370bae6dd3 Cloudflare pagination for zones 2019-01-16 16:13:49 +01:00
Cesar Wong
65e13af9b7 Add zone tag filter for AWS 2018-12-07 10:38:52 -05:00
Anand Patel
3454363d67 allow hostname annotations to be ignored 2018-10-17 17:17:15 -04:00
k8s-ci-robot
dd352b347b
Merge pull request #702 from mackIOConsulting/rfc2136_provider
Rfc2136 provider
2018-10-11 05:49:34 -07:00
Martin Linkhorst
7dbd6b0fa9
fix: pass all relevant CLI flags to AWS provider (#719) 2018-09-27 13:54:40 +02:00
Vladislav Troinich
d32a03ad32 Add couple of tests for RFC2136 provider 2018-09-24 10:52:28 +03:00
Vladislav Troinich
02437bb25c Merge remote-tracking branch 'origin/master' into rfc2136_provider
# Conflicts:
#	Gopkg.lock
#	Gopkg.toml
2018-09-07 10:51:35 +03:00
Peter Bale
be4b4accf9 Change the way aws batching works
This is to change the way batching works when using the aws provider.
Originally, batching would take the first n records you want to update
and perform the desired actions on those records as part of a sync. It
would then wait for the configured sync period and take the first n
records again and sync them. The issue with this is that when you are
using the TXT registry with a custom prefix, the updates can sync a TXT
record and not the accompanying A/CNAME record. This causes external-dns
to get out of sync with what is created and what the current state
actually is. This update uses the same idea of batching, however, rather
than stopping after the first batch until the next run, batching will
now have a separate batch interval which controls the interval between
each batch in the same sync period. This allows external-dns to fully
sync with route53 as part of each sync and can then know that the state
is complete.

Fixes https://github.com/kubernetes-incubator/external-dns/issues/679
2018-09-06 16:44:20 +01:00
Jonas Michel
b9b6842195 Add Source implementation for Istio Gateway (#694)
* add Istio Gateway Source

* add documentation for Istio Gateway Source

* make both istio namespace and ingress gateway service configurable

* prefix gateway types, constructors, and flags with 'istio-'

* fix: add missing sources to source flag docs
2018-09-06 16:39:32 +02:00
Vladislav Troinich
0151de539c Add RFC2136 provider 2018-09-06 11:46:01 +03:00
Nick Jüttner
488f10394a
Merge branch 'master' into generic-source 2018-09-03 10:55:12 +02:00
Nick Jüttner
08c791ff5b
Merge pull request #653 from Devatoria/feature/service_types_filter
Add filter by service type feature
2018-08-31 16:37:10 +02:00
Li Yi
1db16f35af Initial support for Alibaba Cloud 2018-08-28 17:30:36 +08:00
shashidharatd
18aee82d3d Add crd source which gets Endpoints from CRD 2018-08-22 19:37:21 +05:30
Devatoria
05068e3ad3 Add filter by service type feature 2018-08-17 17:14:44 +02:00
Nick Jüttner
dbfc884ba3
Merge pull request #678 from cliedeman/fix/linode-user-agent
Set Linode user agent
2018-08-16 17:21:59 +02:00
Julian Vassev
e6cae22ec4 Configure req timeout calling k8s APIs
When running in a pod sometimes the request to get ingreses/services
stalls indefinitely. A simple pod restart fixes this. Hard to reproduce
but I got lucky and did thread dump which revealed a gorouting blocked
on call to k8s.

What's new is a `--request-timeout` flag that makes requests to k8s
bounded in time. The default is 30s - this may cause some deployments
with a slow api-server to timeout.
2018-08-16 02:59:21 -07:00
cliedeman
ba6c82e043 Set Linode user agent and change to linode/linodego package 2018-08-16 11:17:54 +02:00
Loren Brindze
65b33ad7e2 adding assume role to aws_sd provider 2018-08-14 09:44:12 -07:00
cliedeman
65f8b914b1 Linode Provider Implementation 2018-08-14 16:26:14 +02:00
Arttii
874502ebf8 adding a flag to optionally publish hostIP instead of podIP for headless services (#597)
* Added HostPort feature docs

* Fixed some typos

* Fixing hostIP,podIP change

Fixing hostIP,podIP change

Merge artifacts in docs

Naming typo

removing unnecessary files

fix(source): fix misleading log message

Naming typo

removing unnecessary files

* fix(source): fix misleading log message
2018-07-26 18:16:32 +02:00
Nick Jüttner
717ee8440c
Merge branch 'master' into external-dns-exoscale 2018-07-12 12:21:12 +02:00
Nick Jüttner
f38c347636
Merge branch 'master' into external-dns-exoscale 2018-07-12 11:30:05 +02:00
Andrew Pryde
3c9a944fec Code review comments 2018-07-11 15:44:40 +01:00
Andrew Pryde
88da61e742 Implement Oracle Cloud Infrastructure DNS provider 2018-07-11 15:42:00 +01:00
Christopher Schmidt
07e7103afe implemented dryRun 2018-07-06 07:17:07 +02:00
Yoan Blanc
a487d3878f exoscale: rename exo into exoscale
Signed-off-by: Yoan Blanc <yoan.blanc@exoscale.ch>
2018-07-04 15:00:21 +02:00
Christopher Schmidt
8003a3f00b initial Exoscale Provider 2018-07-04 14:59:48 +02:00
Jason Hoch
d56ef6dbda gofmt 2018-06-19 15:56:55 -04:00
Jason Hoch
15b279a4bc Adds TLS flags for pdns provider 2018-06-19 15:40:32 -04:00
Peter Bale
e34bf552d6 Add aws max change count flag (#596)
* Create `NewAWSProvider` with `AWSConfig` struct

Rather than calling `NewAWSProvider` with a list of objects, you will
now call it using a new `AWSConfig` struct. This allows for clearer
declarations of variables which becomes even  more important as more
variables are added.

* Add `aws-max-change-count` flag

Adding a new `aws-max-change-count` flag to override the default max
change count on the aws provider.

Included updated tests with a new `defaultMaxChangeCount` constant and
tests for setting the value as a flag and as an environment variable.

* Update CHANGELOG.md

Updating CHANGELOG.md with 'Add aws max change count flag' PR.
2018-06-18 14:21:37 +02:00
Nick Jüttner
f458b37662
Merge pull request #589 from jessfraz/cache-results-azure
add cache to limit calls to providers
2018-06-12 12:08:42 +02:00
Jess Frazelle
4759789ac8
add cache to limit calls to Records()
Signed-off-by: Jess Frazelle <acidburn@microsoft.com>
2018-06-12 05:34:23 -04:00