Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix test of ProviderSpecific comparison #886

Merged

Conversation

jhohertz
Copy link
Contributor

@jhohertz jhohertz commented Feb 1, 2019

I believe this will fix the "constant updating" issue introduced in 0.5.10 for all providers (#883, #879) except AWS, which will still require something like #880 to be applied, since that is a different comparison problem of properties that exist on one side only.

At issue is that providers not using the new ProviderSpecific mechanism will have endpoints where ProviderSpecific is <nil>, where the endpoints from sources with no ProviderSpecific elements is instead set to an empty list of that type.

This change simply adds a test for the specific test of "provider is nil, source is empty" and returns false.

There may be a better way to fix this impedance mismatch between the two interfaces, but this quick fix should address the majority of problems.

A built container combining this with #880 is available at viafoura/external-dns:combined-update-fix, and seems to fix the issue. (Though I am only testing AWS provider... which is testing #880 more than this PR....)

Signed-off-by: Joe Hohertz [email protected]

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Feb 1, 2019
@szuecs
Copy link
Contributor

szuecs commented Feb 8, 2019

lgtm

@Raffo
Copy link
Contributor

Raffo commented Feb 8, 2019

I'm fine with letting this go to make sure that we have a latest release that is stable.

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 8, 2019
@Raffo
Copy link
Contributor

Raffo commented Feb 8, 2019

@jhohertz As suspected, here are the conflicts, can you resolve them?

@jhohertz jhohertz force-pushed the fix-provider-specific-compare branch from 65c9578 to 8b1c157 Compare February 8, 2019 13:46
@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 8, 2019
@Raffo
Copy link
Contributor

Raffo commented Feb 8, 2019

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 8, 2019
@Raffo
Copy link
Contributor

Raffo commented Feb 8, 2019

/approve

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: Raffo

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Feb 8, 2019
@k8s-ci-robot k8s-ci-robot merged commit fe39b46 into kubernetes-sigs:master Feb 8, 2019
@szuecs
Copy link
Contributor

szuecs commented Feb 8, 2019

docker image available at: registry.opensource.zalan.do/teapot/external-dns:v0.5.10-16-gfe39b46

@eyvind
Copy link

eyvind commented Feb 11, 2019

v0.5.10-16-gfe39b46 fixed the constant updating problem we were seeing with v0.5.10 on GKE.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants