Commit Graph

56 Commits

Author SHA1 Message Date
srikiz 6e2bfb038e gazelle updates 2021-08-18 21:21:53 +05:30
srikiz c3996024b6 Minor changes for adding digitalocean plugin for dnsprovider 2021-08-18 21:07:40 +05:30
srikiz 41439109a8 Fix DNS Provider package for DO 2021-08-12 00:01:50 +05:30
Ole Markus With 076ae3dfe4 Remove coredns dnsprovider 2021-01-22 09:19:35 +01:00
Barry Melbourne f2ecb5c153 Upgrade Go v1.15.6 / Bazel v3.4.1 2021-01-10 18:13:12 +00:00
Ciprian Hacman 2d9d43ab39 Fix multi-arch image pushing 2020-11-19 07:57:30 +02:00
Kubernetes Prow Robot 42e189605a
Merge pull request #10265 from hakman/docker-manifest
Push multi-arch images
2020-11-18 12:08:06 -08:00
Ciprian Hacman 78c28288a2 Push multi-arch images 2020-11-18 16:52:27 +02:00
Ciprian Hacman 924ab9effa Update Bazel rules for Go to v0.24.7 2020-11-15 12:32:24 +02:00
Peter Rifel 4d9f0128a3
Upgrade to klog2
This splits up the kubernetes 1.19 PR to make it easier to keep up to date until we get it sorted out.
2020-08-16 20:56:48 -05:00
Ciprian Hacman 172031859d ARM64 support - Build multi-arch images 2020-08-10 13:47:07 +03:00
Peter Rifel afd9aa1a4d Enable stamping on bazel image builds
Currently the images have a timestamp of epoch 0:

```
$ docker inspect kope/kops-controller:1.18.0-alpha.2 -f '{{ .Created }}'
1970-01-01T00:00:00Z
```

The `container_image` bazel rule [0] mentions that `creation_time` has a default value of 0 unless `stamp = True`, so this should be enabled on all container_image rules that are pushed to a docker registry.

[0] https://github.com/bazelbuild/rules_docker#container_image-1
2020-04-02 20:27:14 -05:00
Justin SB 46c8cc6d86 makefile: use more hash helpers when building images
It's cleaner & more consistent.
2020-02-16 13:10:31 -05:00
Justin SB 0cb35638f2
Stop logging to /var/log/kops-controller.log
Writing to a hostPath from a non-root container requires file
ownership changes, which is difficult to roll out today.  See
discussion in #8454

We were primarily using the logfile for e2e diagnostics, so we're
going to look into collecting the information via other means instead.

We also haven't yet shipped this logfile in a released version (though
we have shipped it in beta releases)
2020-02-04 06:41:25 -05:00
Justin Santa Barbara 3ae2ccb153
Use component-base for metrics
Another dependency on k/k removed!

prometheus
2020-01-17 06:35:21 -05:00
John Gardiner Myers 14bc441d8d Run dns-controller and kops-controller as non-root user 2019-12-21 21:28:44 -08:00
Justin SB b6862103bb
Change default port for memberlist from 3997
We had a port collision on 3997; change the default memberlist ports
to avoid the collision (we haven't shipped a release with this in it).

Also create a go file so that we can use constants to keep track of
our port numbers, rather than magic values.
2019-10-14 07:26:27 -04:00
Justin SB e611f39e48
Upload dns-controller archive, use in KOPS_BASE_URL
Like we recently did with kops-controller, this means we aren't
reliant on pushing a docker container for development.  This should
also fix the e2e tests, which otherwise break whenever we make an
incompatible change to dns-controller.
2019-10-13 08:34:44 -07:00
Thomas Jackson cd8c743d1c make gomod 2019-10-10 13:10:13 -07:00
Thomas Jackson 6acbfe661b Move gossip implementations into a plugin interface 2019-10-10 13:09:22 -07:00
Thomas Jackson cfcb93e822 Misc fixes 2019-10-10 13:09:22 -07:00
Thomas Jackson 421ee540b9 Add memberlist gossip option 2019-10-10 13:08:55 -07:00
mikesplain 9e55b8230a Update copyright notices
Also cleans some white spaces
2019-09-09 14:47:51 -04:00
Justin SB 605659b415
Call klog.InitFlags in dns-controller
Otherwise the logging flags don't get registered.
2019-05-10 01:04:53 -04:00
Justin SB 76d03b3f71
Generated files: glog -> klog 2019-05-06 12:56:03 -04:00
Justin SB 3e33ac7682
Change code from glog to klog
We don't call klog.InitFlags yet, because that will cause a flag
redefinition error until we get everyone to stop using glog.  That
will happen when we update to k8s 1.13.
2019-05-06 12:54:51 -04:00
Ilya Shaisultanov 712528728c dns-controller: allow configuring DNS update interval 2018-09-06 13:29:51 -06:00
Thanabodee Charoenpiriyakij 49b203e126 Fixes go vet complains
When try `make govet` on `go1.11beta1`. It complains many things
related to invalid string formatting:

```
pkg/kubemanifest/visitor.go:35: Verbose.Infof format %s has arg v of wrong type bool
pkg/kubemanifest/visitor.go:40: Verbose.Infof format %s has arg v of wrong type float64
upup/pkg/fi/cloudup/alitasks/disk.go:76: Verbose.Info call has possible formatting directive %q
upup/pkg/fi/cloudup/alitasks/disk.go:91: Verbose.Info call has possible formatting directive %q
upup/pkg/fi/cloudup/alitasks/launchconfiguration.go:89: Verbose.Info call has possible formatting directive %q
upup/pkg/fi/cloudup/alitasks/loadbalancer.go:71: Verbose.Info call has possible formatting directive %q
upup/pkg/fi/cloudup/alitasks/loadbalancer.go:125: Verbose.Info call has possible formatting directive %q
upup/pkg/fi/cloudup/alitasks/scalinggroup.go:71: Verbose.Info call has possible formatting directive %q
dns-controller/pkg/dns/dnscontroller.go:603: Verbose.Infof format %s has arg records of wrong type []dns.Record
dns-controller/cmd/dns-controller/main.go:184: Verbose.Info call has possible formatting directive %q
pkg/acls/s3/storage.go:62: Verbose.Infof format %q arg u.String is a func value, not called
pkg/apis/kops/validation/validation_test.go:199: T.Fatalf format %q has arg config of wrong type *k8s.io/kops/pkg/apis/kops.DockerConfig
pkg/resources/aws/aws.go:1306: Warning call has possible formatting directive %q
pkg/resources/aws/aws.go:1313: Warning call has possible formatting directive %v
upup/pkg/fi/cloudup/aliup/ali_cloud.go:218: Verbose.Info call has possible formatting directive %q
upup/pkg/fi/cloudup/aliup/ali_cloud.go:290: Verbose.Info call has possible formatting directive %q
upup/pkg/fi/fitasks/keypair.go:266: Errorf format %q has arg e.Name of wrong type *string
upup/pkg/fi/files_owner.go:56: Infof format %s has arg group of wrong type *fi.Group
upup/pkg/fi/users.go:57: Warning call has possible formatting directive %q
upup/pkg/fi/users.go:63: Warning call has possible formatting directive %q
upup/pkg/fi/users.go:68: Warning call has possible formatting directive %q
upup/pkg/fi/users.go:129: Warning call has possible formatting directive %q
upup/pkg/fi/users.go:135: Warning call has possible formatting directive %q
upup/pkg/fi/nodeup/nodetasks/file.go:313: Errorf format %q has arg e.Mode of wrong type *string
upup/pkg/fi/cloudup/awsup/aws_cloud.go:1021: Warningf format %q reads arg #2, but call has 1 arg
upup/pkg/fi/cloudup/awsup/aws_cloud.go:1025: Warningf format %q reads arg #2, but call has 1 arg
```
2018-08-22 22:48:22 +07:00
Justin Santa Barbara 07dc543877 flag naming: metrics-listen-addr => metrics-listen
This follows our patterns a bit better IMO
2018-04-03 06:56:42 -07:00
Justin Santa Barbara 5474753ce1 dns-controller: don't expose prometheus metrics by default 2018-04-03 06:56:42 -07:00
Tom Wilkie f8eaeb9f5d Export kubernetes client metrics from dns-controller. 2018-03-14 09:29:13 +00:00
Peter Wilson 184f193c8e Fix route53 default value for MaxBatchSize 2018-03-01 15:29:31 +11:00
Peter Wilson 07eb8ed9d1 Add route53 max changeset batch size flag 2018-03-01 14:11:16 +11:00
Mike Splain 45a57915e2 Fix bazel deprecation notice 2018-02-26 09:36:13 -05:00
andrewsykim 662939e626 dns-controller: support digitalocean 2018-02-24 13:48:43 -05:00
chrislovecnm 4dd3bb1dea Updating bazel BUILD files with new go_rules version 2017-12-29 15:03:14 -07:00
Justin Santa Barbara f03cc5dbd9 Update dnsprovider imports to use our version 2017-12-13 20:43:01 -05:00
chrislovecnm 609e268a1d gazelle updates with new bazel version 2017-11-05 17:41:53 -07:00
Justin Santa Barbara 0143be7c4f autogen: BUILD and BUILD.bazel 2017-10-02 14:27:21 -04:00
Justin Santa Barbara 544990842a More fixes for 1.8 API changes 2017-10-01 23:02:32 -04:00
Rohith b64795673d DNS Controller Limitation
The current implementation does not place any limitation on the dns annontation which the dns-controller can consume. In a multi-tenented environment was have to ensure certain safe guards are met, so users can't byt accident or intentionally alter our internal dns. Note; the current behaviour has not been changed;

- added the --watch-namespace option to the dns controller and WatchNamespace to the spec
- cleaned up area of the code where possible or related
- fixed an vetting issues that i came across on the journey
- renamed the dns-controller watcher files
2017-09-22 11:37:00 +01:00
Hanfei Shen fc50984f09 support china region 2017-07-16 00:57:38 +08:00
Justin Santa Barbara 85f13a42ab gossipdns: More comments and better error handling 2017-04-25 14:00:30 -04:00
Justin Santa Barbara c8b18be9dd Gossip backed DNS 2017-04-25 01:32:21 -04:00
Miao Luo c5519c0009 Add CoreDNS support into DNS controller addon image. 2017-04-20 23:33:21 -07:00
Miao Luo 6b010c4c5e Enable CoreDNS in nodeup/protokube (#6)
* Enable CoreDNS in nodeup/protokube.

* Address comments.
2017-04-20 23:33:21 -07:00
Justin Santa Barbara 115a4ffffc dns-controller: skip over duplicate records
Route53 considers this an error
2017-03-28 02:16:24 -04:00
Justin Santa Barbara cb4641fea3 Code updates 2017-03-16 02:40:50 -04:00
Justin Santa Barbara 31394aedfa dns-controller: include namespace in keys
Avoids collisions when two services are named the same (for example).

Fix #1788
2017-02-15 23:58:25 -05:00
Justin Santa Barbara 537085d94c dns-controller: don't make spurious updates in buffer
These will be caught later anyway, but we can save a false invalidation
and a spurious log message.
2017-01-08 21:37:12 -05:00