fix: CNAME resolution when External DNS strips trailing dots#77
fix: CNAME resolution when External DNS strips trailing dots#77lukasmetzner wants to merge 2 commits intomainfrom
Conversation
External DNS normalizes CNAME targets by removing the trailing dot, which causes CNAME records pointing to a different domain to resolve incorrectly (e.g. `foo.mytarget.com.myzone.com`). Fixes #73
Codecov Report❌ Patch coverage is
📢 Thoughts on this report? Let us know! |
|
Could you add links about your findings in the description please? And why this is not a bug in external dns? |
I updated the description. Not sure if this explanation is sufficient. |
|
Decision: We will ask at external-dns why this behavior is necessary and if this could be documented. |
|
There was a patch to external-dns that allowed trailing dots: kubernetes-sigs/external-dns#6218 https://github.com/kubernetes-sigs/external-dns/releases/tag/v0.21.0 So we can probably move forward, and think again if we really want to implement this PR. |
AFAICT this patch only affects the custom resource definition from external-dns and not the Service or Ingress objects. We could still move forward with this, as the CNAME issue our user ran into still exists. |
External DNS normalizes CNAME targets by removing the trailing dot, which causes CNAME records pointing to a different domain to resolve incorrectly (e.g.
foo.mytarget.com.myzone.com).External DNS is normalizing CNAMES in multiple locations of their code:
For this reason, other providers implement a check to ensure the trailing dot is present according to the needs of their DNS system:
The exact reasoning for this normalization is not documented by External DNS.
Fixes #73