Releases: gardener/external-dns-management
Releases · gardener/external-dns-management
v0.7.21
[external-dns-management]
Improvements
- [OPERATOR] set finalizer immediately when DNSEntry becomes valid (fix for "already busy for owner" problems) (#136, @MartinWeindel)
- [OPERATOR] don't set new DNSEntry to invalid if DNSOwner is pending (#135, @MartinWeindel)
- [OPERATOR] infoblox: allow SSL_VERIFY to be specified in the DNSProvider secret (#132, @MartinWeindel)
- [OPERATOR] restrict caching to target namespace for DNS source controllers to reduce logging (#130, @MartinWeindel)
- [OPERATOR] added lastUpdateTime field to status of DNSProvider and DNSEntry (#129, @MartinWeindel)
v0.7.20
[external-dns-management]
Action Required
- [OPERATOR] If dns-controller-manager is used on clusters not created ("shooted") by Gardener and you are using (#123, @MartinWeindel)
- the source controllers with different default and target clusters, you are now required to provide an id for the default cluster explicitly. No non-unique default value is assumed anymore in this case.
- There are two ways to provide it.
- Use the command line option
--kubeconfig.id
or the corresponding valueconfiguration.kubeconfigId
for the helm chart - Or alternatively you can create a configmap
cluster-identity
on the default cluster. Seeexamples/15-cluster-identity.yaml
for concrete structure.
Improvements
- [OPERATOR] use component prefix for prometheus metrics names (#126, @MartinWeindel)
- [OPERATOR] support migration of
resources.gardener.cloud/owners
with the--migration-ids
option (#123, @MartinWeindel)
v0.7.19
[external-dns-management]
Improvements
- [OPERATOR] alicloud-dns/cloudflare-dns/infoblox providers: fix creation of DNSEntry for wildcard domain for the base domain of a hosted zone (#122, @MartinWeindel)
- [OPERATOR] Ready DNSEntries with provider having problem enter State state instead of Error (#117, @mandelsoft)
v0.7.18
[external-dns-management]
Improvements
- [OPERATOR] Keep finalizer for DNSEntry if its DNSProvider is not ready (#116, @MartinWeindel)
v0.7.17
[external-dns-management]
Improvements
- [OPERATOR] Faster recovery if zones request fails temporarily for a provider (#115, @MartinWeindel)
- [OPERATOR] Reduce repeated logging of ownerids (#115, @MartinWeindel)
- [OPERATOR] Added
VerticalPodAutoscaler
definition to the external-dns-management chart. (#114, @MartinWeindel) - [OPERATOR] Updated Kubernetes dependencies to 1.18 (#112, @MartinWeindel)
v0.7.16
Fixes:
- fix NPE in reference cache
- incorporate controller manager library fix recognizing empty kubeconfig option for multiple cluster support to enable in-cluster config
DO NOT USE VERSIONS 0.7.12 to 0.7.15 IF THE MULTI-CLUSTER MODE SHOULD BE USED
v0.7.15
[external-dns-management]
DO NOT USE
Improvements
- [USER] fix source DNSEntry references (#101, @MartinWeindel)
- [USER] fix dnsannotations update (#101, @MartinWeindel)
- [OPERATOR] Fix incompatibility in controller-manager-library leading to "permission denied by realms" errors (#104, @MartinWeindel)
- [OPERATOR] fix vulnerability CVE-2020-14040 (#102, @MartinWeindel)
- [OPERATOR] Fix hosted zone reconcilation after backend is not available temporarily. (#100, @MartinWeindel)
- [OPERATOR] Added provider for Infoblox DNS (#98, @MartinWeindel)
v0.7.13
[external-dns-management]
DO NOT USE
Improvements
- [OPERATOR] fix dnsannotations crd in helm charts (#97, @MartinWeindel)
v0.7.12
[external-dns-management]
Improvements
- [USER] If a hosted zone contains another hosted zone, DNS entries of the sub hosted zone are now correctly assigned it and not to the super hosted zone. (#92, @MartinWeindel)
- [USER] DNSAnnotation objects can be used to inject annotations normally set on source objects (#90, @MartinWeindel)
- [USER] reference option for dns entry objects (#90, @MartinWeindel)
- [OPERATOR] added generalized rate limiter for all DNS providers (#90, @MartinWeindel)
- [OPERATOR]
PodSecurityPolicy
has been added and all linux capabilities are dropped by default. The UID and GID ofdns-controller-manager
container are now both65534
. (#88, @mvladev)
patch release Vulnerability CVE-2020-14040
upgrade the golang x/text package to v0.3.3