-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: filter peering zones in google provider #3690
fix: filter peering zones in google provider #3690
Conversation
Welcome @itspngu! |
/ok-to-test |
/approve |
Thanks for raising this, tried to raise a PR to add a test for the peering filter but as it's a forked branch I'm unable to do so, if it's any help you can add the test from this branch |
Thank you! I didn't realize the zones were created during the e2e test, should have looked at the code more closely. I'll try to get your additions into this branch while retaining your authorship without making the CI throw up 🤞 |
/approve cancel |
Hm, have you rebased your forked branch with master? |
Right, that sorted it. Now the CI is running again and you need to sign the CLA but tests are worth it. Thanks! :D |
Nice, signed |
@szuecs Can we get this reviewed by a maintainer please |
Totally forgot about this because we're running a fork including the change. Would be great to get a fresh review, sorry for the chaos caused while adding the tests. |
/lgtm |
@seanmalloy @szuecs Sorry for the direct ping, but I was wondering if you had the chance to give this a look yet. Apologies for the noise caused by merging the tests. If there's anything I can do to help get this merged, please do let me know. |
Here's some additional context on what these zones are and why they need to be filtered: https://cloud.google.com/dns/docs/zones/zones-overview#dns_peering_limitations_and_key_points TL;DR: They are not something records can be created in, they're a sort of read-only reference to a DNS zone in another project. When |
@seanmalloy @szuecs Sorry for another ping, but just want to bump this as we're currently using a self-built version to work around this and are hoping this fix will get in to a official release at some point |
/lgtm |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: johngmyers The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Description
Filters peering zones from the list of zones considered for creation of records by the google provider. This is needed because peering zones do not allow the creation of records, so if a peering zone matches a domain filter, external-dns tries to create records in it, causing the entire changeset to fail and no records to be created (even in other, valid zones).
Fixes #2947
Checklist
Notes
Changes to end user docs were not necessary.