- 24 Oct, 2019 2 commits
-
-
Reinier Schoof authored
Group equal DNS names into same endpoint
-
Martin Linkhorst authored
-
- 01 Oct, 2019 3 commits
-
-
Reinier Schoof authored
-
Reinier Schoof authored
-
Reinier Schoof authored
-
- 24 Sep, 2019 1 commit
-
-
Kubernetes Prow Robot authored
Add RBAC manifest, update wording around IAM policy
-
- 17 Sep, 2019 9 commits
-
-
Kubernetes Prow Robot authored
Run go mod tidy with go 1.13
-
Martin Linkhorst authored
-
Kubernetes Prow Robot authored
v0.5.17
-
njuettner authored
Signed-off-by:
njuettner <nick@zalando.de>
-
Kubernetes Prow Robot authored
Support Cloudflare API Token Auth
-
Mike Eves authored
-
Mike Eves authored
-
Kubernetes Prow Robot authored
upgrade go version to 1.13 in external-dns
-
Kubernetes Prow Robot authored
exoscale: add context support
-
- 16 Sep, 2019 3 commits
-
-
Yoan Blanc authored
Signed-off-by:
Yoan Blanc <yoan@dosimple.ch>
-
Kubernetes Prow Robot authored
Fix AWS IAM Roles for Service Accounts permission problem.
-
Brian Hong authored
Amazon EKS supports IAM Roles for Service Accounts. It mounts tokens files to `/var/run/secrets/eks.amazonaws.com/serviceaccount/token`. Unfortunately, external-dns runs as 'nobody' so it cannot access this file. External DNS is then unable to make any AWS API calls to work: ``` time="2019-09-11T07:31:53Z" level=error msg="WebIdentityErr: unable to read file at /var/run/secrets/eks.amazonaws.com/serviceaccount/token\ncaused by: open /var/run/secrets/eks.amazonaws.com/serviceaccount/token: permission denied" ``` See: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-technical-overview.html Below are the file permissions mounted on External DNS pod: ``` ~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/ total 0 drwxrwxrwt 3 root root 100 Sep 11 06:40 . drwxr-xr-x 3 root root 28 Sep 11 06:40 .. drwxr-xr-x 2 root root 60 Sep 11 06:40 ..2019_09_11_06_40_49.865776187 lrwxrwxrwx 1 root root 31 Sep 11 06:40 ..data -> ..2019_09_11_06_40_49.865776187 lrwxrwxrwx 1 root root 12 Sep 11 06:40 token -> ..data/token ~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token -rw------- 1 root root 1028 Sep 11 06:40 /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token ``` This commit fixes this problem by specifying securityContext to make mounted volumes with 65534 (nobody) group ownership.
-
- 12 Sep, 2019 1 commit
-
-
Mike Eves authored
-
- 10 Sep, 2019 13 commits
-
-
Tariq Ibrahim authored
-
Kubernetes Prow Robot authored
Fix txt prefix bug, should be lowercased because when writing to dns …
-
Nick Jüttner authored
-
Nick Jüttner authored
-
Nick Jüttner authored
-
Kubernetes Prow Robot authored
Improvements to the source CRD
-
Kubernetes Prow Robot authored
TXTRegistry: do not overwrite labels of records returned by the provider
-
Kubernetes Prow Robot authored
Update rfc2136 tutorial for use with Microsoft DNS
-
Kubernetes Prow Robot authored
Support delegate Contour IngressRoutes
-
Kubernetes Prow Robot authored
Fixing Infoblox incorrect match of zone dns names
-
Kubernetes Prow Robot authored
AWS-SD: Add support for AWS Network Load Balancers
-
Kubernetes Prow Robot authored
Updated AWS SDK version
-
Marcus Noble authored
Signed-off-by:
Marcus Noble <m.noble@elsevier.com>
-
- 05 Sep, 2019 2 commits
-
-
Braxton Schafer authored
Clean up the tutorial and update it to clarify usage with non-BIND DNS servers.
-
Jaromir Vanek authored
-
- 30 Aug, 2019 1 commit
-
-
Kubernetes Prow Robot authored
Updated AWS SDK to v1.23.12
-
- 29 Aug, 2019 1 commit
-
-
Micah Hausler authored
-
- 28 Aug, 2019 3 commits
-
-
Kubernetes Prow Robot authored
Add create-only policy
-
Martin Linkhorst authored
-
Greg authored
Updating latest upstream
-
- 23 Aug, 2019 1 commit
-
-
Kubernetes Prow Robot authored
Update changelog with fix for retries flag
-