external-dns icon indicating copy to clipboard operation
external-dns copied to clipboard

feat(ambassador): add support for provider specific annotations

Open fad3t opened this issue 1 year ago • 16 comments

Description This change adds support for provider-specific annotations for the ambassador source.

fad3t avatar Dec 17 '23 15:12 fad3t

Hi @fad3t. Thanks for your PR.

I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

k8s-ci-robot avatar Dec 17 '23 15:12 k8s-ci-robot

@fad3t Would you please : 0. Detail and document the provider specific annotations you would want to use

  1. Add test case with annotations on this source

mloiseleur avatar Dec 22 '23 12:12 mloiseleur

Hi @mloiseleur,

Sure, at the moment I'm mostly interested by the Cloudflare proxied annotation. I did my best adding some tests (also trying to stick with standards seen in other sources), please don't hesitate to share comments or ideas to improve it further.

Thx, Fred

fad3t avatar Dec 23 '23 15:12 fad3t

Good morning, Is this OK to test or do I need to provide some more information? Thx

fad3t avatar Jan 10 '24 07:01 fad3t

Hi @mloiseleur did you have any chance to look at this one? Is it OK to test? Thx

fad3t avatar Jan 24 '24 09:01 fad3t

/ok-to-test

mloiseleur avatar Jan 24 '24 10:01 mloiseleur

@fad3t Sure. It still needs some documentation on this feature.

mloiseleur avatar Jan 24 '24 10:01 mloiseleur

@mloiseleur do you have any idea of what could be wrong here?

 --- FAIL: TestAmbassadorHostSource (0.00s)
    --- FAIL: TestAmbassadorHostSource/Service_with_load_balancer_hostname (0.71s)
        ambassador_host_test.go:322: Targets expected "8.8.4.4;8.8.8.8", got "dns.google"
        ambassador_host_test.go:322: RecordType expected "A", got "CNAME" 

Those tests run OK locally, and the resolveLoadBalancerHostname flag is set to true when calling extractLoadBalancerTargets, so the hostname should have been replaced by the corresponding IPs.

As for the docs, did you have something in mind? I see there's already some docs about annotations, I've simply flagged the fact Ambassador now supports provider-specific annotations.

Thanks

fad3t avatar Jan 24 '24 14:01 fad3t

Hello, can anybody help with the failing test (see comment above)? Thx

fad3t avatar Feb 12 '24 09:02 fad3t

The test has been fixed. @fad3t : You just need to rebase.

mloiseleur avatar Feb 12 '24 10:02 mloiseleur

@mloiseleur I tried rebasing but it would ask me to fix conflicts that have nothing to do with my code.. so instead I merged master into my branch and here it is. Yet it looks like it has plenty of changes unrelated to my feature :) Any recommendation to make this clean?

fad3t avatar Feb 12 '24 10:02 fad3t

To remove your last merge commit, something like:

git reset --hard HEAD~1
git push

Should do it.

mloiseleur avatar Feb 12 '24 11:02 mloiseleur

To remove your last merge commit, something like:

git reset --hard HEAD~1
git push

Should do it.

Yeah, had to look at the commit SHA as I didn't squash during the merge. Anyway now it looks OK and checks are green :) let me know if that's good for you - and thx for the help!

fad3t avatar Feb 12 '24 12:02 fad3t

That's far better now. /lgtm

mloiseleur avatar Feb 12 '24 13:02 mloiseleur

Hey there 👋 anything else I can do to push this forward? Thanks!

fad3t avatar Feb 25 '24 13:02 fad3t

/approve

szuecs avatar Mar 12 '24 13:03 szuecs

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: szuecs

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment Approvers can cancel approval by writing /approve cancel in a comment

k8s-ci-robot avatar Mar 12 '24 13:03 k8s-ci-robot

Thanks a lot 👍

fad3t avatar Mar 12 '24 15:03 fad3t