Google Cloud client does not handle missing a- TXT records
What happened:
external-dns tried to update some records. Their TXT records with prefix a- were missing, and external-dns failed to handle it:
googleapi: Error 404: The 'entity.change.deletions[18]' resource named 'a-AA.XX.com. (TXT)' does not exist.
More details:
Reason: notFound, Message: The 'entity.change.deletions[18]' resource named 'a-AA.XX.com. (TXT)' does not exist.
Reason: notFound, Message: The 'entity.change.deletions[19]' resource named 'a-BB.XX.com. (TXT)' does not exist.
Reason: notFound, Message: The 'entity.change.deletions[20]' resource named 'a-CC.XX.com. (TXT)' does not exist.
Reason: notFound, Message: The 'entity.change.deletions[21]' resource named 'a-DD.XX.com. (TXT)' does not exist.
Reason: notFound, Message: The 'entity.change.deletions[22]' resource named 'a-EE.XX.com. (TXT)' does not exist.
Reason: notFound, Message: The 'entity.change.deletions[23]' resource named 'a-FF.XX.com. (TXT)' does not exist.
Reason: notFound, Message: The 'entity.change.deletions[24]' resource named 'a-GG.XX.com. (TXT)' does not exist.
Reason: notFound, Message: The 'entity.change.deletions[25]' resource named 'a-HH.XX.com. (TXT)' does not exist.
Reason: notFound, Message: The 'entity.change.deletions[26]' resource named 'a-II.XX.com. (TXT)' does not exist.
What you expected to happen:
external-dns can handle missing a- TXT records and continue.
How to reproduce it (as minimally and precisely as possible):
- Create a record in Google Cloud via
external-dns - Stop
external-dns - Remove
a-...TXT record manually - Start
external-dns - See it failing due to missing record
Anything else we need to know?:
Environment:
- External-DNS version (use
external-dns --version): 0.12.0 - DNS provider: Google Cloud
- Others: Kubernetes 1.22.8 (GKE)
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs.
This bot triages issues and PRs according to the following rules:
- After 90d of inactivity,
lifecycle/staleis applied - After 30d of inactivity since
lifecycle/stalewas applied,lifecycle/rottenis applied - After 30d of inactivity since
lifecycle/rottenwas applied, the issue is closed
You can:
- Mark this issue or PR as fresh with
/remove-lifecycle stale - Mark this issue or PR as rotten with
/lifecycle rotten - Close this issue or PR with
/close - Offer to help out with Issue Triage
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
/remove-lifecycle stale
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs.
This bot triages issues and PRs according to the following rules:
- After 90d of inactivity,
lifecycle/staleis applied - After 30d of inactivity since
lifecycle/stalewas applied,lifecycle/rottenis applied - After 30d of inactivity since
lifecycle/rottenwas applied, the issue is closed
You can:
- Mark this issue or PR as fresh with
/remove-lifecycle stale - Mark this issue or PR as rotten with
/lifecycle rotten - Close this issue or PR with
/close - Offer to help out with Issue Triage
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
/remove-lifecycle stale
Looks like resolved in #2811