-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(Google CloudDNS): add routing policy support #4928
base: master
Are you sure you want to change the base?
feat(Google CloudDNS): add routing policy support #4928
Conversation
Hi @Dadeos-Menlo. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/ok-to-test |
/retitle feat(Google CloudDNS): add routing policy support |
4cfd960
to
15dea04
Compare
/ok-to-test |
@Dadeos-Menlo You'll need to run BTW, do you think you can join the kubernetes slack ? |
15dea04
to
cd12389
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Thanks; I've rebased the proposed changes, which introduced the
Sure; I've joined the #external-dns channel. |
cd12389
to
867a948
Compare
867a948
to
dc82175
Compare
… single resource record set
relying upon the implementation under test to establish the initial test conditions. Also make mock interface implementations more representative of real behaviour.
bee202f
to
510d19d
Compare
Co-authored-by: Michel Loiseleur <[email protected]>
510d19d
to
a45b9e6
Compare
cc @ivankatliarchuk for review |
I think we should not proceed with proposed approach. More information here #4875 (comment) But I'll try to be structured, with what is wrong to attach annotations on CRD of the same vendor. Like from example
When defining a CRD, the spec section should be the authoritative source of configuration. It breaks Kubernetes convention → Annotations should not replace spec, but augment.
This approach is generally not recommended by the Kubernetes community. The community prefers:
When Is It Okay to Mix CRDs & and attach Annotations from same vendor?
Alternative Approach
|
The changes proposed in this pull-request are entirely unrelated to CRDs; so I do not understand your objections? The only reference the changes proposed here have to CRDs is the fact that I happen to have used a Ironically, #4875 also has very little to do with CRDs; that pull-request relates to the consistent representation of provider-specific properties throughout "external-dns". The usage of a
I would argue "yes"; and therefore that is a bug I propose addressing as a small part of the changes proposed under #4875. |
Description
Google's CloudDNS service supports routing policies (i.e. geolocation and weighted-round-robin based query responses) but the current implementation of the "google" provider does not support managing such routing policy enabled resource record sets.
The proposed changes include:
plan.Changes.All()
function, and associatedplan.RRSetChange
structure, for representing changes to be applied to a managed domain as an ordered sequence of changes grouped by resource record setNotes:
Checklist