Commit Graph

64 Commits

Author SHA1 Message Date
Michael Fraenkel
fab942f486 Cache the endpoints on the controller loop
The controller will retrieve all the endpoints at the beginning of its
loop. When changes need to be applied, the provider may need to query
the endpoints again. Allow the provider to skip the queries if its data was
cached.
2019-05-07 19:51:53 -04:00
Michael Fraenkel
f4f9708791 Set a default TTL for AWS Alias records 2019-04-13 16:21:12 -04:00
Kubernetes Prow Robot
38089fcd8c
Merge pull request #966 from fraenkel/streamline
Streamline AWS ApplyChanges
2019-04-11 08:44:13 -07:00
Michael Fraenkel
f4f3c9939f Streamline AWS ApplyChanges
- collect the zones and records once
2019-04-11 07:32:20 -04:00
Jason Fillo
44c32e1ed8 aws-r53: adding china ELB endpoints and hosted zone id's. fixed typo when reformatting 2019-04-09 11:51:44 -05:00
Jason Fillo
3881192067 aws-r53: adding china ELB endpoints and hosted zone id's. corrected formatting 2019-04-09 09:58:10 -05:00
Jason Fillo
2f34d2d201 aws-r53: adding china ELB endpoints and hosted zone id's 2019-04-09 09:25:21 -05:00
Martin Linkhorst
a29d24ddaf
fix: reduce number of API requests by caching a bit 2019-01-29 14:55:06 +01:00
Nick Jüttner
6d39526069
Merge branch 'master' into cloudflare-proxied-annotation 2019-01-24 11:16:54 +01:00
Joe Hohertz
7a28e3047a Adds a new flag --aws-api-retries which allows overriding the
number of retries that API calls will attempt before giving up.

This somewhat mitigates the issues discussed in #484 by allowing
the current sync attempt to complete vs. failing and starting anew.

Defaults to 3, which is what the aws-sdk-go defaults to where not
specified.

Signed-off-by: Joe Hohertz <joe@viafoura.com>
2019-01-17 12:37:27 -05:00
Joakim Olsson
ca0d3aa59c Add support for eu-north-1 2019-01-07 15:37:22 +01:00
Cesar Wong
65e13af9b7 Add zone tag filter for AWS 2018-12-07 10:38:52 -05:00
Erik Swets
e0e7a9defd Allow setting Cloudflare proxying by annotation 2018-11-16 12:52:47 +01:00
Nick Jüttner
ae2b782b58
Merge pull request #742 from mytaxi/feature/add-alias-annotation
Feature/add alias annotation
2018-11-14 14:22:58 +01:00
k8s-ci-robot
3bc7e07cd3
Merge pull request #727 from etopeter/aws_wildcard_txtprefix_match
Matching entire string for wildcard in txt records with prefixes
2018-11-14 04:55:27 -08:00
vaegt
38dc658270
Change log level 2018-11-09 11:19:19 +01:00
vaegt
a4b753df6c
Format changes 2018-10-16 14:29:41 +02:00
vaegt
bb80f99e17
Add alias annotation for ingress 2018-10-16 13:30:07 +02:00
Peter Strzyzewski
e9faea3596 Matching entire string for wildcard in txt records with prefixes 2018-10-02 14:40:18 -07:00
Martin Linkhorst
f21f45b15d
fix(aws): correctly populate target health check on existing records 2018-10-02 17:44:02 +02:00
Peter Bale
93053087f1 Adding new tests for additional batching logic
This is to add two new tests which will cover the new logic where the
submit route53 changes function can error if any one of the updates
fails for any given batch in any given zone. Additionally, there is now
a test to check that the application does not try and create a set of
entries if the total number of changes associated with a given name is
greater than the total number of allowed changes per batch.
2018-09-06 16:44:20 +01:00
Peter Bale
be4b4accf9 Change the way aws batching works
This is to change the way batching works when using the aws provider.
Originally, batching would take the first n records you want to update
and perform the desired actions on those records as part of a sync. It
would then wait for the configured sync period and take the first n
records again and sync them. The issue with this is that when you are
using the TXT registry with a custom prefix, the updates can sync a TXT
record and not the accompanying A/CNAME record. This causes external-dns
to get out of sync with what is created and what the current state
actually is. This update uses the same idea of batching, however, rather
than stopping after the first batch until the next run, batching will
now have a separate batch interval which controls the interval between
each batch in the same sync period. This allows external-dns to fully
sync with route53 as part of each sync and can then know that the state
is complete.

Fixes https://github.com/kubernetes-incubator/external-dns/issues/679
2018-09-06 16:44:20 +01:00
Aditya Purandare
5c552a953d fix log message for #592 when no updates in hosted zones (#634) 2018-07-16 10:19:53 +02:00
Peter Bale
ee941aab56 Add aws-evaluate-target-health flag
This is to add a new `--aws-evaluate-target-health` which allows the
user to override the default EvaluateTargetHealth value (currently set
to `true`) when creating AWS Route53 ALIAS records. To disable, pass
`--no-aws-evaluate-target-health` as outlined in the help page.

Closes https://github.com/kubernetes-incubator/external-dns/issues/627
2018-07-06 11:58:55 +01:00
Nick Jüttner
2e4778fac8
Merge pull request #594 from elordahl/names
AWS provider: Properly check suitable domains
2018-06-20 17:15:46 +02:00
Peter Bale
e34bf552d6 Add aws max change count flag (#596)
* Create `NewAWSProvider` with `AWSConfig` struct

Rather than calling `NewAWSProvider` with a list of objects, you will
now call it using a new `AWSConfig` struct. This allows for clearer
declarations of variables which becomes even  more important as more
variables are added.

* Add `aws-max-change-count` flag

Adding a new `aws-max-change-count` flag to override the default max
change count on the aws provider.

Included updated tests with a new `defaultMaxChangeCount` constant and
tests for setting the value as a flag and as an environment variable.

* Update CHANGELOG.md

Updating CHANGELOG.md with 'Add aws max change count flag' PR.
2018-06-18 14:21:37 +02:00
Svend Sorensen
e01cf2f61d Print a message if no hosted zones match (aws provider) (#592)
* Print a message if no hosted zones match (aws provider)

Fixes #590

* Remove early return
2018-06-14 20:53:54 +02:00
Eric Lordahl
d250699af3
AWS provider: Properly check suitable domains 2018-06-14 14:18:10 -04:00
Martin Linkhorst
3f675b0cb1 feat: add support for AWS NLBs 2018-04-19 10:10:38 +02:00
Nick Jüttner
8819ed62e8
Merge pull request #524 from linki/assume-role
AWS: Allow to assume another role
2018-04-18 16:02:06 +02:00
Martin Linkhorst
790a78292a
fix: actually change the correct config object 2018-04-18 13:51:28 +02:00
Martin Linkhorst
4dd4decf7d
ref: use AWS's AssumeRoleProvider to refresh credentials 2018-04-17 17:57:30 +02:00
Martin Linkhorst
587b4128cb
feat: allow to assume another role for AWS 2018-04-12 14:59:28 +02:00
Gary Kramlich
1cef71e0be Inititial support for multiple targets per record 2018-03-13 23:16:51 -05:00
Till Klocke
5d54849699 Implementation of multiple targets based on PR #404 and #396 (#418)
* Endpoint.Target is now Endpoint.Targets. This is its own type representing mutliple targets for a single DNS name while adding some convenience for sorting and comparing

* Made everything compile and tests run through with the new Endpoint.Targets

* The ingress source can now properly handle multiple target ips per host

* Added custom conflict resolver, to better understand how conflict resolution has to work for me

* My custom conflict resolver behaves a bit different than the PerResource resolver, therefore I needed to modify the expected test result

Removed unnecessary FIXME

* The ingress source now creates CNAME endpoints with multiple targets to let the DNS provider decide how to handle multiple CNAME targets. This could be interesting for weighted targets etc.

* Adopted the expected results to the new way we create endpoints for CNAMEs

* Removed Add method from Targets since manipulating the slice through here is unnecessary complicated and doesn't deliver enough convenience

* Reverted ConflictResolver to the original one. There is some discussing to do what the best way is to handle conflicts

* Added missing documenting comment to IsLess of Targets

* Added documenting comments to Targets,Targets.Same and NewTargets to clarify their intention and usage

* Service source now also generates endpoints with multiple targets

* Service and Ingress source now sort all Targets for every Endpoint to make order of Targets predictable

* Endpoints generated by the Google Cloud DNS provider now also have sorted Targets to make order of Targets predictable

* Modified provider dyn to be able to compile with multi target changes

* Fixed small nitpicks, so my code is acceptable

* Fixed merge method after updating to new Targets. Replacing '!=' with .Same of course needs a boolean negation

* Tests for dyn provider now also use the new Targets instead of Target

* Simplified extractServiceIps as implied by linki to make it more readable

* ref: change service ClusterIP retrieval again

* Added entry to CHANGELOG.md describing the new features contained in this PR
2018-02-21 18:11:45 +01:00
Zach Arnold
bf93fd8844 add paris region (#452)
* add paris region

* adds test
2018-01-30 10:40:49 +01:00
Corey O'Brien
53011dc115 Update AWS private hosted zones in addition to public zone (#356)
* Update AWS private hosted zones in addition to public zone

* Sort slices for consistent ordering in TestAWSSuitableZones

* ref: use len to check for empty list of matched zones

* feat: mention contributors in changelog

* fix: move changelog entry to the unreleased section

* fix: add one more missing attribution to the changelog
2018-01-05 17:32:54 +01:00
Valentyn Boginskey
4dacf81238 New filter: --zone-id-filter (#422)
* Add aws-zone-id flag

* Add Zone ID filter

* Update AWS provider and main

* Make ZoneIDFilter generic

* Implement ZoneIDFilter for all providers

* Update CHANGELOG
2017-12-20 17:00:13 +01:00
Martin Linkhorst
af1532cb3c fix: print matched dns zones (gcp, aws) (#401) 2017-11-28 23:13:29 +01:00
Steven Logue
1202cb2185 added AWS API limit function and unit tests 2017-11-09 10:01:21 -08:00
Kevin J. Qiu
71723bdd5b Allow specifying a custom TTL through annotation on Ingress or Service (#320)
* Add RecordTTL

* Route53: test for custom TTL

* Fix tests

* Fix remaining tests

* Add ttl when endpoint is created from ingress

* Missed a word

* Fix bad refactoring

* Add ingress custom TTL test

* gofmt

* Satisfy go-lint

* Unshadow `endpoint` in azure provider

* Fix and add an output test

* Add TTL for endpoints generated from service templates

* Take TTL into account when generating update plan

* Tests for TTL change impact on the plan

* Refactor factory method name

* Refactoring

* Run gofmt

* Make endpoint string format look like BIND config

* Update plan and plan_test

* Replace NewEndpointWithTTLValue with NewEndpointWithTTL in aws

* Remove NewEndpointWithTTLValue func

* Update references to TTL

* Remove getTTLValue func

* Handle merge conflict

* Update tests

* Update README, CHANGELOG and documentation

* Run gofmt

* Move getTTLFromAnnotations to a common file

* Refactor getTTLFromAnnotations

* Gofmt

* Add tests for getTTLFromAnnotations

* Trigger build

* Add boilerplate header

* Update README/CHANGELOG according to code review

* Add ttl.md and link it from README

* change CNAME string to endpoint.RecordTypeCNAME

* fix test cases with AWS ALIAS records, these do not behave different in these tests
2017-10-11 14:17:02 +02:00
Nick Jüttner
f5639c4cb7 #228 Simplify DNS provider requirements by extracting common (#263)
* #228 Simplify DNS provider requirements by extracting common

* #228 Simplify DNS provider requirements by extracting common

* Missing boilerplate added

* rename recordtypefilter, fail fast statements

* rework zone finder, update deps

* chore: drop namespace from cloudflare method name
2017-10-11 12:16:28 +02:00
Martin Linkhorst
3331a57a18 Fix issue with uppercase logrus import (#351)
* chore: use lowercase for logrus repository

* chore: update dependencies using glide
2017-10-09 17:14:18 +02:00
Martin Linkhorst
dd1cc4d553 feat(provider/aws): allow filtering for private/public zones (#329) 2017-09-19 23:15:31 +02:00
Seth Pollack
f14a953b5f Kops Compatibility #1: Set RecordType at source (#248)
* set RecordType at source

* add comments for linting
2017-08-25 14:41:40 +02:00
Maxim Ivanov
396e084465 Fix for wildcard domains handling in Route53 (#302)
* Fix for wildcard domains handling in Route53

Wildcard domains (*.abc) are stored as "\\052.abc" in Route53,
which confuses external-dns as it tries to recreate entry over and
over.

It is confusing, but documented behaviour of Route53:
http://docs.aws.amazon.com/Route53/latest/DeveloperGuide/DomainNameFormat.html?shortFooter=true#domain-name-format-asterisk

* Added tests for wildcard unescaping
2017-08-09 23:02:58 +02:00
Nils Juenemann
73d397961e Support for multiple domains within --domain-filter (#252)
* Support for multiple domains within --domain-filter

The parameter accepts a comma separated list of domains with or without trailing dot. Example: --domain-filter="example.org, company.test.,staging.com". Closes #247 and #229

* Add boilerplate header

* Add documentation for methods and structs

* use StringsVar for the domain-filter flag

* go fmt

* Remove camel case from tests

* Revert changes in README.md

* Move DomainFilter to provider package

* Make a new slice and copy elements to it

* Update CHANGELOG.md

* docs: change minor spelling mistake
2017-06-29 18:59:05 +02:00
Yerken
229944f7ab make all provider implementation public, return struct instead of interface (#234) 2017-06-13 10:32:13 +02:00
Martin Linkhorst
a18656f1b0 add client-side metrics for all external calls (#188)
* chore: add instrumented HTTP client library

* feat: add client-side metrics to outgoing HTTP clients
2017-05-22 15:39:59 +02:00
Martin Linkhorst
707bdc4d95 ref(*): remove superflous zone parameter (#212) 2017-05-22 15:38:27 +02:00